{"id":"UBUNTU-CVE-2018-20481","details":"XRef::getEntry in XRef.cc in Poppler 0.72.0 mishandles unallocated XRef entries, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PDF document, when XRefEntry::setFlag in XRef.h is called from Parser::makeStream in Parser.cc.","modified":"2026-01-30T01:17:34.797239Z","published":"2018-12-25T00:00:00Z","related":["USN-3865-1"],"upstream":["CVE-2018-20481"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-20481"},{"type":"REPORT","url":"https://gitlab.freedesktop.org/poppler/poppler/issues/692"},{"type":"REPORT","url":"https://gitlab.freedesktop.org/poppler/poppler/merge_requests/143"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3865-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2018-20481"}],"affected":[{"package":{"name":"poppler","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/poppler@0.24.5-2ubuntu4.15?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.24.5-2ubuntu4.15"}]}],"versions":["0.24.1-0ubuntu1","0.24.3-0ubuntu1","0.24.3-0ubuntu2","0.24.3-0ubuntu3","0.24.3-0ubuntu4","0.24.3-0ubuntu5","0.24.3-0ubuntu6","0.24.3-0ubuntu7","0.24.3-0ubuntu8","0.24.3-0ubuntu10","0.24.3-0ubuntu12","0.24.5-0ubuntu3","0.24.5-2ubuntu1","0.24.5-2ubuntu2","0.24.5-2ubuntu4","0.24.5-2ubuntu4.1","0.24.5-2ubuntu4.2","0.24.5-2ubuntu4.3","0.24.5-2ubuntu4.4","0.24.5-2ubuntu4.5","0.24.5-2ubuntu4.6","0.24.5-2ubuntu4.7","0.24.5-2ubuntu4.8","0.24.5-2ubuntu4.9","0.24.5-2ubuntu4.11","0.24.5-2ubuntu4.12","0.24.5-2ubuntu4.13","0.24.5-2ubuntu4.14"],"ecosystem_specific":{"binaries":[{"binary_name":"gir1.2-poppler-0.18","binary_version":"0.24.5-2ubuntu4.15"},{"binary_name":"libpoppler-cpp-dev","binary_version":"0.24.5-2ubuntu4.15"},{"binary_name":"libpoppler-cpp0","binary_version":"0.24.5-2ubuntu4.15"},{"binary_name":"libpoppler-dev","binary_version":"0.24.5-2ubuntu4.15"},{"binary_name":"libpoppler-glib-dev","binary_version":"0.24.5-2ubuntu4.15"},{"binary_name":"libpoppler-glib8","binary_version":"0.24.5-2ubuntu4.15"},{"binary_name":"libpoppler-private-dev","binary_version":"0.24.5-2ubuntu4.15"},{"binary_name":"libpoppler-qt4-4","binary_version":"0.24.5-2ubuntu4.15"},{"binary_name":"libpoppler-qt4-dev","binary_version":"0.24.5-2ubuntu4.15"},{"binary_name":"libpoppler-qt5-1","binary_version":"0.24.5-2ubuntu4.15"},{"binary_name":"libpoppler-qt5-dev","binary_version":"0.24.5-2ubuntu4.15"},{"binary_name":"libpoppler44","binary_version":"0.24.5-2ubuntu4.15"},{"binary_name":"poppler-utils","binary_version":"0.24.5-2ubuntu4.15"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-20481.json"}},{"package":{"name":"poppler","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/poppler@0.41.0-0ubuntu1.11?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.41.0-0ubuntu1.11"}]}],"versions":["0.33.0-0ubuntu3","0.37.0-0ubuntu1","0.38.0-0ubuntu1","0.41.0-0ubuntu1","0.41.0-0ubuntu1.1","0.41.0-0ubuntu1.2","0.41.0-0ubuntu1.3","0.41.0-0ubuntu1.4","0.41.0-0ubuntu1.5","0.41.0-0ubuntu1.6","0.41.0-0ubuntu1.7","0.41.0-0ubuntu1.8","0.41.0-0ubuntu1.9","0.41.0-0ubuntu1.10"],"ecosystem_specific":{"binaries":[{"binary_name":"gir1.2-poppler-0.18","binary_version":"0.41.0-0ubuntu1.11"},{"binary_name":"libpoppler-cpp-dev","binary_version":"0.41.0-0ubuntu1.11"},{"binary_name":"libpoppler-cpp0","binary_version":"0.41.0-0ubuntu1.11"},{"binary_name":"libpoppler-dev","binary_version":"0.41.0-0ubuntu1.11"},{"binary_name":"libpoppler-glib-dev","binary_version":"0.41.0-0ubuntu1.11"},{"binary_name":"libpoppler-glib8","binary_version":"0.41.0-0ubuntu1.11"},{"binary_name":"libpoppler-private-dev","binary_version":"0.41.0-0ubuntu1.11"},{"binary_name":"libpoppler-qt4-4","binary_version":"0.41.0-0ubuntu1.11"},{"binary_name":"libpoppler-qt4-dev","binary_version":"0.41.0-0ubuntu1.11"},{"binary_name":"libpoppler-qt5-1","binary_version":"0.41.0-0ubuntu1.11"},{"binary_name":"libpoppler-qt5-dev","binary_version":"0.41.0-0ubuntu1.11"},{"binary_name":"libpoppler58","binary_version":"0.41.0-0ubuntu1.11"},{"binary_name":"poppler-utils","binary_version":"0.41.0-0ubuntu1.11"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-20481.json"}},{"package":{"name":"poppler","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/poppler@0.62.0-2ubuntu2.6?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.62.0-2ubuntu2.6"}]}],"versions":["0.57.0-2ubuntu4","0.57.0-2ubuntu5","0.62.0-1ubuntu1","0.62.0-2ubuntu1","0.62.0-2ubuntu2","0.62.0-2ubuntu2.1","0.62.0-2ubuntu2.2","0.62.0-2ubuntu2.4","0.62.0-2ubuntu2.5"],"ecosystem_specific":{"binaries":[{"binary_name":"gir1.2-poppler-0.18","binary_version":"0.62.0-2ubuntu2.6"},{"binary_name":"libpoppler-cpp-dev","binary_version":"0.62.0-2ubuntu2.6"},{"binary_name":"libpoppler-cpp0v5","binary_version":"0.62.0-2ubuntu2.6"},{"binary_name":"libpoppler-dev","binary_version":"0.62.0-2ubuntu2.6"},{"binary_name":"libpoppler-glib-dev","binary_version":"0.62.0-2ubuntu2.6"},{"binary_name":"libpoppler-glib8","binary_version":"0.62.0-2ubuntu2.6"},{"binary_name":"libpoppler-private-dev","binary_version":"0.62.0-2ubuntu2.6"},{"binary_name":"libpoppler-qt5-1","binary_version":"0.62.0-2ubuntu2.6"},{"binary_name":"libpoppler-qt5-dev","binary_version":"0.62.0-2ubuntu2.6"},{"binary_name":"libpoppler73","binary_version":"0.62.0-2ubuntu2.6"},{"binary_name":"poppler-utils","binary_version":"0.62.0-2ubuntu2.6"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-20481.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}