
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in PoDoFo version 0.9.7, identified as CVE-2021-30469. The flaw involves a use-after-free vulnerability in the PoDoFo::PdfVecObjects::Clear() function, which can be triggered by processing a specially crafted PDF file (NVD, RedHat Bugzilla).
The vulnerability is classified as CWE-416 (Use After Free) with a CVSS v3.1 base score of 5.5 (Medium). The attack vector is local (AV:L), with low attack complexity (AC:L), requiring no privileges (PR:N) but user interaction (UI:R), and the scope is unchanged (S:U). The impact primarily affects availability with high severity (C:N/I:N/A:H) (NVD).
When successfully exploited, this vulnerability can lead to a denial of service condition in applications using the affected PoDoFo library. The impact is primarily focused on system availability, with no direct effect on confidentiality or integrity (NVD).
The vulnerability affects PoDoFo version 0.9.7 and has been tracked in various Linux distributions including Fedora, EPEL-7, and Debian. Users are advised to update to newer versions of the software when available (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."