{"id":"CVE-2019-9199","details":"PoDoFo::Impose::PdfTranslator::setSource() in pdftranslator.cpp in PoDoFo 0.9.6 has a NULL pointer dereference that can (for example) be triggered by sending a crafted PDF file to the podofoimpose binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.","modified":"2026-04-16T04:30:39.591733908Z","published":"2019-02-26T23:29:00.247Z","related":["SUSE-SU-2024:2137-1","SUSE-SU-2024:3541-1","openSUSE-SU-2024:14278-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CIC2EXSSMBT3MY2HY42IIY4BUQS2SVYB/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTJ5AAM6Y4NMSELEH7N5ZG4DNO56BCYF/"},{"type":"FIX","url":"https://github.com/mksdev/podofo/commit/1400a9aaf611299b9a56aa2abeb158918b9743c8"},{"type":"FIX","url":"https://github.com/jjanku/podofo/commit/ada821df68fb0bf673840ed525daf4ec709dbfd9"},{"type":"EVIDENCE","url":"https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-setsource-podofo-0-9-6-trunk-r1967/"},{"type":"EVIDENCE","url":"https://sourceforge.net/p/podofo/tickets/40/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jjanku/podofo","events":[{"introduced":"0"},{"fixed":"ada821df68fb0bf673840ed525daf4ec709dbfd9"}]},{"type":"GIT","repo":"https://github.com/mksdev/podofo","events":[{"introduced":"0"},{"fixed":"1400a9aaf611299b9a56aa2abeb158918b9743c8"}]},{"type":"GIT","repo":"https://github.com/podofo/podofo","events":[{"introduced":"0"},{"last_affected":"5abb212ed25241496a076480ff6cb54d6e17df71"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.9.6"}]}}],"versions":["0.9.6"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-9199.json","vanir_signatures":[{"source":"https://github.com/mksdev/podofo/commit/1400a9aaf611299b9a56aa2abeb158918b9743c8","target":{"file":"tools/podofoimpose/pdftranslator.cpp","function":"PdfTranslator::setSource"},"signature_type":"Function","id":"CVE-2019-9199-27e86fce","digest":{"function_hash":"114678319409777638106424493009355070136","length":1371},"signature_version":"v1","deprecated":false},{"source":"https://github.com/mksdev/podofo/commit/1400a9aaf611299b9a56aa2abeb158918b9743c8","signature_version":"v1","signature_type":"Line","id":"CVE-2019-9199-7d348a9e","digest":{"threshold":0.9,"line_hashes":["91467993189206180637373526123538555756","147081754293459487944095391029288134771","252712849672768889612401769505912580815","221669561651739394719530265712522042082"]},"target":{"file":"tools/podofoimpose/pdftranslator.cpp"},"deprecated":false},{"source":"https://github.com/jjanku/podofo/commit/ada821df68fb0bf673840ed525daf4ec709dbfd9","signature_version":"v1","signature_type":"Line","id":"CVE-2019-9199-8acc8647","digest":{"threshold":0.9,"line_hashes":["91467993189206180637373526123538555756","147081754293459487944095391029288134771","252712849672768889612401769505912580815","221669561651739394719530265712522042082"]},"target":{"file":"tools/podofoimpose/pdftranslator.cpp"},"deprecated":false},{"source":"https://github.com/jjanku/podofo/commit/ada821df68fb0bf673840ed525daf4ec709dbfd9","signature_version":"v1","signature_type":"Function","id":"CVE-2019-9199-b87b817e","digest":{"function_hash":"114678319409777638106424493009355070136","length":1371},"target":{"file":"tools/podofoimpose/pdftranslator.cpp","function":"PdfTranslator::setSource"},"deprecated":false}],"vanir_signatures_modified":"2026-04-11T17:54:17Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}