{"id":"MGASA-2013-0332","summary":"Updated poppler packages fix multiple vulnerabilities","details":"Updated poppler packages fix security vulnerabilities:\n\nPoppler is found to be affected by a stack based buffer overflow vulnerability\nin the pdfseparate utility. Successfully exploiting this issue could allow\nremote attackers to execute arbitrary code in the context of the affected\napplication. Failed exploits may result in denial-of-service conditions\n(CVE-2013-4473).\n\nPoppler was found to have a user controlled format string vulnerability because\nit fails to sanitize user-supplied input. An attacker may exploit this issue to\nexecute arbitrary code in the context of the vulnerable application. Failed\nexploit attempts will likely result in a denial-of-service condition\n(CVE-2013-4474).\n","modified":"2026-04-16T01:49:07.205060288Z","published":"2013-11-20T20:28:35Z","upstream":["CVE-2013-4473","CVE-2013-4474"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2013-0332.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/pipermail/package-announce/2013-November/121297.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=11560"}],"affected":[{"package":{"name":"poppler","ecosystem":"Mageia:2","purl":"pkg:rpm/mageia/poppler?arch=source&distro=mageia-2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.18.4-2.3.mga2"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0332.json"}},{"package":{"name":"poppler","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/poppler?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.22.1-1.1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0332.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}