Published on May 28th, 2019 📆 | 7187 Views ⚑
0Xpdf 4.01.01 fofi/FoFiTrueType.cc FoFiTrueType::dumpString PDF Document memory corruption
CVSS Meta Temp Score | Current Exploit Price (≈) |
---|---|
5.5 | $0-$5k |
A vulnerability was found in Xpdf 4.01.01 (Document Reader Software). It has been classified as critical. This affects the function FoFiTrueType::dumpString
of the file fofi/FoFiTrueType.cc. The manipulation as part of a PDF Document leads to a memory corruption vulnerability (Stack-based). CWE is classifying the issue as CWE-119. This is going to have an impact on confidentiality, integrity, and availability.
The weakness was published 05/27/2019. This vulnerability is uniquely identified as CVE-2019-12360 since 05/27/2019. Technical details are known, but no exploit is available. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 05/28/2019).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Name
VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5
VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.5
VulDB Vector: ?
VulDB Reliability: ?
VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Memory corruption / Stack-based (CWE-119)
Local: Yes
Remote: No
Availability: ?
Status: Not defined
Price Prediction: ?
Current Price Estimation: ?
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: no mitigation known
0-Day Time: ?
05/27/2019 Advisory disclosed
05/27/2019 CVE assigned
05/28/2019 VulDB entry created
05/28/2019 VulDB last update
CVE: CVE-2019-12360 (?)Created: 05/28/2019 06:55 AM
Complete: ?
Download the whitepaper to learn more about our service!
https://vuldb.com/?id.135645
Gloss