Description
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: id:000000,sig:11,src:000010+000007,op:splice,rep:16: file is damaged
WARNING: id:000000,sig:11,src:000010+000007,op:splice,rep:16: can't find startxref
WARNING: id:000000,sig:11,src:000010+000007,op:splice,rep:16: Attempting to reconstruct cross-reference table
Program received signal SIGSEGV, Segmentation fault.
0x00007ffff7b55761 in QPDFObjectHandle::parseInternal(PointerHolder, std::__cxx11::basic_string<char,
std::char_traits, std::allocator > const&, QPDFTokenizer&, bool&, QPDFObjectHandle::StringDecrypter*, QPDF*, bool,
bool, bool) ()
from /usr/lib/x86_64-linux-gnu/libqpdf.so.17
(gdb) exploitable
Description: Possible stack corruption
Short description: PossibleStackCorruption (7/22)
Hash: b5da70c1923e3824f45ebafcfe77a71b.018fde94be00aea515ed79b00d59768a
Exploitability Classification: EXPLOITABLE
Explanation: GDB generated an error while unwinding the stack and/or the stack contained return addresses that were not mapped
in the inferior's process address space and/or the stack pointer is pointing to a location outside the default stack region.
These conditions likely indicate stack corruption, which is generally considered exploitable.
Other tags: DestAv (8/22), AccessViolation (21/22)