Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <49953B68.3090002@pardus.org.tr>
Date: Fri, 13 Feb 2009 11:20:40 +0200
From: Pinar Yanardag <pinar@...dus.org.tr>
To: oss-security@...ts.openwall.com
Subject: CVE Request: Poppler -Two Denial of Service Vulnerabilities

 From Secunia [1]:

--->8---
Two vulnerabilities have been reported in Poppler, which can be 
exploited by malicious people to cause a DoS (Denial of Service).

1) An uninitialised memory access error in the 
"FormWidgetChoice::loadDefaults()" function can be exploited to cause a 
crash via a specially crafted PDF document.

2) An error in the "JBIG2Stream::readSymbolDictSeg()" function can be 
exploited to cause a crash via a specially crafted PDF document.
--->8---

[1]: http://secunia.com/Advisories/33853

-- 
Pinar Yanardag
http://pinguar.org
_____________________________
Pardus Security Team
http://security.pardus.org.tr


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.