CVE-2017-2820

NameCVE-2017-2820
DescriptionAn exploitable integer overflow vulnerability exists in the JPEG 2000 image parsing functionality of freedesktop.org Poppler 0.53.0. A specially crafted PDF file can lead to an integer overflow causing out of bounds memory overwrite on the heap resulting in potential arbitrary code execution. To trigger this vulnerability, a victim must open the malicious PDF in an application using this library.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
poppler (PTS)jessie, jessie (lts)0.26.5-2+deb8u16vulnerable
stretch (security)0.48.0-2+deb9u4vulnerable
stretch (lts), stretch0.48.0-2+deb9u6vulnerable
buster (security), buster, buster (lts)0.71.0-5+deb10u3vulnerable
bullseye (security), bullseye20.09.0-3.1+deb11u1vulnerable
bookworm22.12.0-2vulnerable
sid, trixie24.08.0-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
popplersource(unstable)(unfixed)unimportant

Notes

Debian uses openjpeg for processing JPEG 2000 images, this advisory is
against Ubuntu, which disables openjpeg due to being in universe
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0321

Search for package or bug name: Reporting problems