Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-18267 : Vulnerability Insights and Analysis

Learn about CVE-2017-18267, a denial of service vulnerability in Poppler versions prior to 0.64.0. Remote attackers can exploit this issue by providing a specially crafted PDF file.

A denial of service vulnerability exists in the FoFiType1C::cvtGlyph function in Poppler versions prior to 0.64.0, allowing remote attackers to exploit it via a specially crafted PDF file.

Understanding CVE-2017-18267

This CVE involves a denial of service vulnerability in Poppler versions prior to 0.64.0, which can be triggered by a maliciously crafted PDF file.

What is CVE-2017-18267?

The CVE-2017-18267 vulnerability is a denial of service (infinite recursion) issue in the FoFiType1C::cvtGlyph function in Poppler versions prior to 0.64.0. Attackers can trigger this vulnerability by providing a specifically crafted PDF file, as demonstrated by pdftops.

The Impact of CVE-2017-18267

        Attackers can exploit this vulnerability remotely by supplying a malicious PDF file.
        The vulnerability can lead to a denial of service condition due to infinite recursion.

Technical Details of CVE-2017-18267

This section provides detailed technical information about the CVE-2017-18267 vulnerability.

Vulnerability Description

The FoFiType1C::cvtGlyph function in fofi/FoFiType1C.cc in Poppler through 0.64.0 allows remote attackers to cause a denial of service (infinite recursion) via a crafted PDF file.

Affected Systems and Versions

        Affected Version: Poppler versions prior to 0.64.0

Exploitation Mechanism

        Remote attackers can exploit this vulnerability by providing a specially crafted PDF file.

Mitigation and Prevention

Mitigation strategies and preventive measures for CVE-2017-18267.

Immediate Steps to Take

        Update Poppler to version 0.64.0 or later to mitigate the vulnerability.
        Be cautious when opening PDF files from untrusted sources.

Long-Term Security Practices

        Regularly update software and apply security patches promptly.
        Implement network security measures to detect and block malicious PDF files.

Patching and Updates

        Apply the security updates provided by Poppler to address the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now