{"id":"UBUNTU-CVE-2019-13283","details":"In Xpdf 4.01.01, a heap-based buffer over-read could be triggered in strncpy from FoFiType1::parse in fofi/FoFiType1.cc because it does not ensure the source string has a valid length before making a fixed-length copy. It can, for example, be triggered by sending a crafted PDF document to the pdftotext tool. It allows an attacker to use a crafted pdf file to cause Denial of Service or an information leak, or possibly have unspecified other impact.","modified":"2026-02-04T03:57:28.215223Z","published":"2019-07-04T20:15:00Z","related":["USN-4646-1"],"upstream":["CVE-2019-13283"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-13283"},{"type":"REPORT","url":"https://forum.xpdfreader.com/viewtopic.php?f=3&t=41843"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4646-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2019-13283"}],"affected":[{"package":{"name":"poppler","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/poppler@0.41.0-0ubuntu1.15?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.41.0-0ubuntu1.15"}]}],"versions":["0.33.0-0ubuntu3","0.37.0-0ubuntu1","0.38.0-0ubuntu1","0.41.0-0ubuntu1","0.41.0-0ubuntu1.1","0.41.0-0ubuntu1.2","0.41.0-0ubuntu1.3","0.41.0-0ubuntu1.4","0.41.0-0ubuntu1.5","0.41.0-0ubuntu1.6","0.41.0-0ubuntu1.7","0.41.0-0ubuntu1.8","0.41.0-0ubuntu1.9","0.41.0-0ubuntu1.10","0.41.0-0ubuntu1.11","0.41.0-0ubuntu1.12","0.41.0-0ubuntu1.13","0.41.0-0ubuntu1.14"],"ecosystem_specific":{"binaries":[{"binary_name":"gir1.2-poppler-0.18","binary_version":"0.41.0-0ubuntu1.15"},{"binary_name":"libpoppler-cpp-dev","binary_version":"0.41.0-0ubuntu1.15"},{"binary_name":"libpoppler-cpp0","binary_version":"0.41.0-0ubuntu1.15"},{"binary_name":"libpoppler-dev","binary_version":"0.41.0-0ubuntu1.15"},{"binary_name":"libpoppler-glib-dev","binary_version":"0.41.0-0ubuntu1.15"},{"binary_name":"libpoppler-glib8","binary_version":"0.41.0-0ubuntu1.15"},{"binary_name":"libpoppler-private-dev","binary_version":"0.41.0-0ubuntu1.15"},{"binary_name":"libpoppler-qt4-4","binary_version":"0.41.0-0ubuntu1.15"},{"binary_name":"libpoppler-qt4-dev","binary_version":"0.41.0-0ubuntu1.15"},{"binary_name":"libpoppler-qt5-1","binary_version":"0.41.0-0ubuntu1.15"},{"binary_name":"libpoppler-qt5-dev","binary_version":"0.41.0-0ubuntu1.15"},{"binary_name":"libpoppler58","binary_version":"0.41.0-0ubuntu1.15"},{"binary_name":"poppler-utils","binary_version":"0.41.0-0ubuntu1.15"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-13283.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]}