DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects
                
            References
                    | Link | Resource | 
|---|---|
| https://gitlab.freedesktop.org/poppler/poppler/-/issues/1011 | Exploit Vendor Advisory | 
| https://gitlab.freedesktop.org/poppler/poppler/-/issues/1011 | Exploit Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 05:27
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://gitlab.freedesktop.org/poppler/poppler/-/issues/1011 - Exploit, Vendor Advisory | 
07 Nov 2023, 03:22
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects | 
Information
                Published : 2020-12-25 02:15
Updated : 2024-11-21 05:27
NVD link : CVE-2020-35702
Mitre link : CVE-2020-35702
CVE.ORG link : CVE-2020-35702
JSON object : View
Products Affected
                freedesktop
- poppler
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
