<html>
<head>
<base href="https://bugs.freedesktop.org/" />
</head>
<body><table border="1" cellspacing="0" cellpadding="8">
<tr>
<th>Priority</th>
<td>medium
</td>
</tr>
<tr>
<th>Bug ID</th>
<td><a class="bz_bug_link
bz_status_NEW "
title="NEW --- - segmentation fault (and probable stack smashing) in pdfseparate"
href="https://bugs.freedesktop.org/show_bug.cgi?id=69434">69434</a>
</td>
</tr>
<tr>
<th>Assignee</th>
<td>poppler-bugs@lists.freedesktop.org
</td>
</tr>
<tr>
<th>Summary</th>
<td>segmentation fault (and probable stack smashing) in pdfseparate
</td>
</tr>
<tr>
<th>Severity</th>
<td>normal
</td>
</tr>
<tr>
<th>Classification</th>
<td>Unclassified
</td>
</tr>
<tr>
<th>OS</th>
<td>All
</td>
</tr>
<tr>
<th>Reporter</th>
<td>dkg@fifthhorseman.net
</td>
</tr>
<tr>
<th>Hardware</th>
<td>Other
</td>
</tr>
<tr>
<th>Status</th>
<td>NEW
</td>
</tr>
<tr>
<th>Version</th>
<td>unspecified
</td>
</tr>
<tr>
<th>Component</th>
<td>utils
</td>
</tr>
<tr>
<th>Product</th>
<td>poppler
</td>
</tr></table>
<p>
<div>
<pre>originally reported at <a href="http://bugs.debian.org/723124">http://bugs.debian.org/723124</a> --
utils/pdfseparate.cc appears to invoke sprintf directly on user-passed
data without cleaning or verifying it.
bool extractPages (const char *srcFileName, const char *destFileName) {
char pathName[1024];
/* ... */
sprintf (pathName, destFileName, pageNo);
This means that an attacker able to control the arguments passed to
pdfseparate, and who can make one of the arguments a multipage pdf,
can probably smash the stack.
A) they could provide a srcFileName long enough to overflow pathName.
this will write to arbitrary memory.
B) they could provide a destFileName with other sprintf placeholders
besides %d, which would effectively be invoked while pointing to
uninitialized memory.
easy segfault:
pdfseparate multipage.pdf test-%s-%d.pdf
I haven't tried to turn this into an exploit, but i'm sure someone
with more time, patience, and cleverness than me could do so.</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are the assignee for the bug.</li>
</ul>
</body>
</html>