Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32364: CWE-190 Integer Overflow or Wraparound in freedesktop Poppler

0
Medium
VulnerabilityCVE-2025-32364cvecve-2025-32364cwe-190
Published: Sat Apr 05 2025 (04/05/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: freedesktop
Product: Poppler

Description

A floating-point exception in the PSStack::roll function of Poppler before 25.04.0 can cause an application to crash when handling malformed inputs associated with INT_MIN.

AI-Powered Analysis

AILast updated: 11/03/2025, 20:17:58 UTC

Technical Analysis

CVE-2025-32364 is an integer overflow vulnerability categorized under CWE-190 found in the Poppler PDF rendering library, specifically in the PSStack::roll function. Poppler versions prior to 25.04.0 are affected. The vulnerability arises when the function processes malformed inputs involving the minimum integer value (INT_MIN), causing an arithmetic overflow or wraparound. This leads to a floating-point exception that crashes the application using Poppler to render or manipulate PDF files. The flaw impacts the availability of the application by causing denial of service (DoS) conditions but does not compromise confidentiality or integrity. Exploitation requires local access (AV:L) but no privileges (PR:N) or user interaction (UI:N). The vulnerability is not known to be exploited in the wild yet. Poppler is widely used in many Linux distributions and open-source projects for PDF rendering, making this vulnerability relevant for desktop environments, document processing servers, and any software relying on Poppler. The CVSS 3.1 base score is 4.0, indicating medium severity, with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L. No patches were linked at the time of publication, but upgrading to Poppler 25.04.0 or later is expected to resolve the issue. The root cause is an integer overflow leading to a floating-point exception, a common issue in low-level C++ libraries handling complex data structures like stacks.

Potential Impact

For European organizations, this vulnerability primarily threatens the availability of systems that utilize Poppler for PDF rendering or processing. Potential impacts include application crashes and denial of service when handling specially crafted PDF files containing malformed inputs triggering the integer overflow. This could disrupt business operations relying on automated document processing, PDF viewing, or printing services. While the vulnerability does not expose sensitive data or allow code execution, repeated crashes could degrade user experience and interrupt workflows. Organizations running Linux-based desktop environments, document management systems, or web services that parse PDFs with Poppler are at risk. The impact is more pronounced in sectors with heavy document handling such as government, finance, legal, and publishing. Since exploitation requires local access, the threat is mitigated somewhat by network perimeter defenses but remains relevant for insider threats or compromised endpoints. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

1. Upgrade Poppler to version 25.04.0 or later as soon as the patch becomes available to address the integer overflow vulnerability. 2. Until patching is possible, implement sandboxing or containerization for applications that process untrusted PDF files to isolate potential crashes and limit impact on critical systems. 3. Employ input validation and filtering mechanisms to detect and block malformed or suspicious PDF files before processing. 4. Monitor application logs and system stability for signs of crashes related to PDF handling to detect potential exploitation attempts. 5. Restrict local access to systems running vulnerable Poppler versions to trusted users only, minimizing the risk of local exploitation. 6. For environments with automated PDF processing, consider fallback mechanisms or redundancy to maintain availability during potential crashes. 7. Educate users and administrators about the risk of opening untrusted PDFs and enforce security policies accordingly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-04-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690909fb7fff0e30cee434b5

Added to database: 11/3/2025, 8:00:59 PM

Last enriched: 11/3/2025, 8:17:58 PM

Last updated: 11/4/2025, 2:46:34 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats