{"id":16561,"date":"2021-07-07T12:54:50","date_gmt":"2021-07-07T10:54:50","guid":{"rendered":"https:\/\/herolab-usd.formwandler.rocks\/security-advisories\/usd-2018-0019\/"},"modified":"2021-07-19T14:08:31","modified_gmt":"2021-07-19T12:08:31","slug":"usd-2018-0019","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2018-0019\/","title":{"rendered":"usd-2018-0019"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.9.4\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\"][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<h1 class=\"h-custom-headline usd-small-letters h2\"><span>usd-2018-0019 | Pdf-Xchange Viewer, Viewer AX SDK\/2.5.322.7 and earlier<\/span><\/h1>\n<p><span><\/span><\/p>\n<p><span><\/span><strong>Advisory ID<\/strong><span>: usd-2018-0019<\/span><br \/><strong>CVE Number<\/strong><span>: CVE-2018-6462<\/span><br \/><strong>Affected Product<\/strong><span>: Pdf-Xchange Viewer<\/span><br \/><strong>Affected Version<\/strong><span>: 2.5.322.7 and earlier<\/span><br \/><strong>Vulnerability Type<\/strong><span>: Heap Overflow<\/span><br \/><strong>Security Risk<\/strong><span>: High<\/span><br \/><strong>Vendor URL<\/strong><span>: <\/span><a href=\"https:\/\/www.tracker-software.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.tracker-software.com<\/a><br \/><strong>Vendor Status<\/strong><span>: Fixed<\/span><\/p>\n<h3><\/h3>\n<h3>Description<\/h3>\n<p>Tracker PDF-XChange Viewer and Viewer AX SDK before 2.5.322.8 mishandle conversion from YCC to RGB colour spaces by calculating on the basis of 1 bpc instead of 8 bpc, which might allow remote attackers to execute arbitrary code via a crafted PDF document.<\/p>\n<p>There are many ways an attacker could exploit this issue, the most straight forward would be to overflow critical data like function pointers that happen to be allocated next to the heap-chunk that overflows. Calling a function by a function pointer that is controlled by an attacker will give the attacker full control over the running process and the attacker would then be able to run arbitrary code which is considered a very critical vulnerability.<\/p>\n<p><span><\/span><\/p>\n<h3>Proof of Concept (PoC)<\/h3>\n<p><span>Not available.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3>Fix<\/h3>\n<p>Issue is fixed in Build 2.5.322.8 on 24. January 2018 by Tracker Software<\/p>\n<p>&nbsp;<\/p>\n<h3>Timeline<\/h3>\n<ul>\n<li>2018-01-23 Sebastian Feldmann first informed Tracker Software about the vulnerability<\/li>\n<li>2018-01-23 Tracker Software urged for information about the security issue<\/li>\n<li>2018-01-24 Tracker Software received the information about the security issue and had them fixed within 24 hours<\/li>\n<li>2018-01-30 Tracker Software published an article about the security issue on their website: <a href=\"https:\/\/www.tracker-software.com\/company\/news_press_events\/view\/179\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Credits<\/h3>\n<p>This security vulnerabilities were found by Sebastian Feldmann of usd AG.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2018-0019 | Pdf-Xchange Viewer, Viewer AX SDK\/2.5.322.7 and earlier Advisory ID: usd-2018-0019CVE Number: CVE-2018-6462Affected Product: Pdf-Xchange ViewerAffected Version: 2.5.322.7 and earlierVulnerability Type: Heap OverflowSecurity Risk: HighVendor URL: https:\/\/www.tracker-software.comVendor Status: Fixed Description Tracker PDF-XChange Viewer and Viewer AX SDK before 2.5.322.8 mishandle conversion from YCC to RGB colour spaces by calculating on the basis of 1 [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-16561","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=16561"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16561\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=16561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}