### [CVE-2019-9200](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9200) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description A heap-based buffer underwrite exists in ImageStream::getLine() located at Stream.cc in Poppler 0.74.0 that can (for example) be triggered by sending a crafted PDF file to the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. ### POC #### Reference - https://gitlab.freedesktop.org/poppler/poppler/issues/728 - https://research.loginsoft.com/bugs/heap-based-buffer-underwrite-in-imagestreamgetline-poppler-0-74-0/ #### Github - https://github.com/0xCyberY/CVE-T4PDF - https://github.com/ARPSyndicate/cvemon