CVE-2019-14934

7.8 HIGH

📋 TL;DR

This vulnerability in PDFResurrect allows attackers to trigger a malloc failure and out-of-bounds write by providing a malicious PDF file with an invalid size value. This could lead to arbitrary code execution or denial of service. Anyone using PDFResurrect versions before 0.18 to process untrusted PDF files is affected.

💻 Affected Systems

Products:
  • PDFResurrect
Versions: All versions before 0.18
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where PDFResurrect is installed and used to process PDF files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the PDFResurrect process, potentially leading to full system compromise.

🟠

Likely Case

Denial of service (application crash) or limited memory corruption leading to unstable behavior.

🟢

If Mitigated

If proper input validation and sandboxing are in place, impact is limited to application crash.

🌐 Internet-Facing: MEDIUM - Requires processing malicious PDF files, which could be uploaded or downloaded via web services.
🏢 Internal Only: LOW - Typically requires user interaction to process malicious PDF files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting a malicious PDF file that triggers the size validation issue.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.18

Vendor Advisory: https://github.com/enferex/pdfresurrect/commit/0c4120fffa3dffe97b95c486a120eded82afe8a6

Restart Required: No

Instructions:

1. Update PDFResurrect to version 0.18 or later. 2. For Debian systems: apt-get update && apt-get install pdfresurrect. 3. For Fedora systems: dnf update pdfresurrect. 4. For source installation: git clone https://github.com/enferex/pdfresurrect.git, checkout v0.18+, compile and install.

🔧 Temporary Workarounds

Disable PDFResurrect processing

linux

Temporarily disable or remove PDFResurrect from systems until patched.

sudo apt-get remove pdfresurrect
sudo dnf remove pdfresurrect

Restrict PDF file sources

all

Only allow PDFResurrect to process PDF files from trusted sources.

🧯 If You Can't Patch

  • Implement strict input validation for PDF files before processing with PDFResurrect.
  • Run PDFResurrect in a sandboxed environment with limited privileges.

🔍 How to Verify

Check if Vulnerable:

Check PDFResurrect version: pdfresurrect --version. If version is below 0.18, system is vulnerable.

Check Version:

pdfresurrect --version

Verify Fix Applied:

After update, run pdfresurrect --version and confirm version is 0.18 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of PDFResurrect
  • Memory allocation failures in system logs
  • Segmentation fault errors

Network Indicators:

  • Unusual PDF file downloads to systems running PDFResurrect

SIEM Query:

source="*pdfresurrect*" AND ("segmentation fault" OR "malloc" OR "crash")

🔗 References

📤 Share & Export