{"id":"CVE-2018-20650","details":"A reachable Object::dictLookup assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to the lack of a check for the dict data type, as demonstrated by use of the FileSpec class (in FileSpec.cc) in pdfdetach.","modified":"2026-01-30T07:07:35.189524Z","published":"2019-01-01T16:29:00.233Z","related":["MGASA-2019-0092","SUSE-SU-2021:3854-1","SUSE-SU-2023:2906-1","SUSE-SU-2023:2907-1","openSUSE-SU-2021:3854-1"],"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/106459"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2022"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2713"},{"type":"ADVISORY","url":"https://gitlab.freedesktop.org/poppler/poppler/commit/de0c0b8324e776f0b851485e0fc9622fc35695b7"},{"type":"ADVISORY","url":"https://gitlab.freedesktop.org/poppler/poppler/issues/704"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00033.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3865-1/"},{"type":"REPORT","url":"https://gitlab.freedesktop.org/poppler/poppler/issues/704"},{"type":"FIX","url":"https://gitlab.freedesktop.org/poppler/poppler/commit/de0c0b8324e776f0b851485e0fc9622fc35695b7"},{"type":"FIX","url":"https://gitlab.freedesktop.org/poppler/poppler/issues/704"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00033.html"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/poppler/poppler","events":[{"introduced":"0"},{"fixed":"de0c0b8324e776f0b851485e0fc9622fc35695b7"}]}],"versions":["poppler-0.10.0","poppler-0.11.0","poppler-0.11.1","poppler-0.11.2","poppler-0.11.3","poppler-0.12.0","poppler-0.13.1","poppler-0.13.2","poppler-0.13.3","poppler-0.13.4","poppler-0.14.0","poppler-0.15.0","poppler-0.15.1","poppler-0.15.2","poppler-0.15.3","poppler-0.16.0","poppler-0.17.0","poppler-0.17.1","poppler-0.17.2","poppler-0.17.3","poppler-0.17.4","poppler-0.18.0","poppler-0.19.0","poppler-0.19.1","poppler-0.19.2","poppler-0.19.3","poppler-0.19.4","poppler-0.2.0","poppler-0.20.0","poppler-0.20.1","poppler-0.20.2","poppler-0.20.3","poppler-0.20.4","poppler-0.20.5","poppler-0.21.0","poppler-0.21.1","poppler-0.21.2","poppler-0.21.3","poppler-0.21.4","poppler-0.22.0","poppler-0.22.1","poppler-0.22.2","poppler-0.22.3","poppler-0.22.4","poppler-0.23.0","poppler-0.23.1","poppler-0.23.2","poppler-0.23.3","poppler-0.23.4","poppler-0.24.0","poppler-0.24.1","poppler-0.24.2","poppler-0.24.3","poppler-0.24.4","poppler-0.24.5","poppler-0.25.0","poppler-0.25.1","poppler-0.25.2","poppler-0.25.3","poppler-0.26.0","poppler-0.26.1","poppler-0.26.2","poppler-0.26.3","poppler-0.26.4","poppler-0.28.0","poppler-0.28.1","poppler-0.29.0","poppler-0.3.0","poppler-0.3.1","poppler-0.3.2","poppler-0.3.3","poppler-0.30.0","poppler-0.31.0","poppler-0.32.0","poppler-0.33.0","poppler-0.34.0","poppler-0.35.0","poppler-0.36","poppler-0.37","poppler-0.38.0","poppler-0.39","poppler-0.4.0","poppler-0.40.0","poppler-0.41.0","poppler-0.42.0","poppler-0.43","poppler-0.44","poppler-0.45","poppler-0.46","poppler-0.47","poppler-0.48","poppler-0.49","poppler-0.5.0","poppler-0.5.1","poppler-0.5.2","poppler-0.5.3","poppler-0.5.4","poppler-0.50","poppler-0.51","poppler-0.52","poppler-0.53","poppler-0.54","poppler-0.55","poppler-0.56","poppler-0.57","poppler-0.58","poppler-0.59","poppler-0.6.0","poppler-0.6.0.RC1","poppler-0.60","poppler-0.60.1","poppler-0.61","poppler-0.61.1","poppler-0.62.0","poppler-0.63.0","poppler-0.64.0","poppler-0.65.0","poppler-0.66.0","poppler-0.67.0","poppler-0.68.0","poppler-0.69.0","poppler-0.7.0","poppler-0.7.1","poppler-0.7.2","poppler-0.7.3","poppler-0.70.0","poppler-0.70.1","poppler-0.71.0","poppler-0.72.0","poppler-0.8.0","poppler-0.9.0","poppler-0.9.1","poppler-0.9.2","poppler-0.9.3","poppler-before-fontconfig"],"database_specific":{"vanir_signatures":[{"signature_version":"v1","deprecated":false,"source":"https://gitlab.freedesktop.org/poppler/poppler@de0c0b8324e776f0b851485e0fc9622fc35695b7","signature_type":"Function","target":{"file":"poppler/FileSpec.cc","function":"FileSpec::FileSpec"},"id":"CVE-2018-20650-4cf0bf9e","digest":{"function_hash":"249822804868323713812360103822680906390","length":812}},{"signature_version":"v1","deprecated":false,"source":"https://gitlab.freedesktop.org/poppler/poppler@de0c0b8324e776f0b851485e0fc9622fc35695b7","signature_type":"Line","target":{"file":"poppler/FileSpec.cc"},"id":"CVE-2018-20650-9594da17","digest":{"line_hashes":["293949540968280903538352693917672011553","80900747097883303778158019435312285310","21427333946226228288953424865544875497","111764228469009528479060060427103681018","336533272156547176625856577059739631806","55015525656138811578310982402018421318","292205714106596341773240197416630493705"],"threshold":0.9}}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-20650.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}