Vulnerability Description
VeryPDF PCL Converter 2.7 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long password string. Attackers can trigger a buffer overflow by entering a 3000-byte password in the PDF Security encryption fields, causing the application to crash when processing PCL files.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Verypdf | Verypdf | 2.7 |
Related Weaknesses (CWE)
References
- http://www.verypdf.comProduct
- https://www.exploit-db.com/exploits/46872ExploitVDB Entry
- https://www.vulncheck.com/advisories/verypdf-pcl-converter-denial-of-service-viaThird Party Advisory
FAQ
What is CVE-2019-25549?
CVE-2019-25549 is a vulnerability with a CVSS score of 6.2 (MEDIUM). VeryPDF PCL Converter 2.7 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long password string. Attackers can trigger a buff...
How severe is CVE-2019-25549?
CVE-2019-25549 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-25549?
Check the references section above for vendor advisories and patch information. Affected products include: Verypdf Verypdf.