EulerOS 2.0 SP2 : poppler (EulerOS-SA-2018-1219)

Medium Nessus Plugin ID 110883


The remote EulerOS host is missing a security update.


According to the version of the poppler packages installed, the
EulerOS installation on the remote host is affected by the following
vulnerability :

- There is a NULL pointer dereference in the
AnnotPath::getCoordsLength function in Annot.h in an
Ubuntu package for Poppler 0.24.5. A crafted input will
lead to a remote denial of service attack. Later Ubuntu
packages such as for Poppler 0.41.0 are not

Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.


Update the affected poppler package.

See Also

Plugin Details

Severity: Medium

ID: 110883

File Name: EulerOS_SA-2018-1219.nasl

Version: 1.4

Type: local

Published: 2018/07/03

Modified: 2018/11/13

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3.0

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:poppler, p-cpe:/a:huawei:euleros:poppler-glib, p-cpe:/a:huawei:euleros:poppler-qt, p-cpe:/a:huawei:euleros:poppler-utils, cpe:/o:huawei:euleros:2.0

Patch Publication Date: 2018/06/29

Reference Information

CVE: CVE-2018-10768