Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-6544

Опубликовано: 02 фев. 2018
Источник: debian

Описание

pdf_load_obj_stm in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 could reference the object stream recursively and therefore run out of error stack, which allows remote attackers to cause a denial of service via a crafted PDF document.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mupdffixed1.12.0+ds1-1package
mupdfignoredwheezypackage

Примечания

  • https://git.ghostscript.com/?p=mupdf.git;h=26527eef77b3e51c2258c8e40845bfbc015e405d

  • above patch is not needed in Jessie, as there is no fz_try() used in this version

  • https://git.ghostscript.com/?p=mupdf.git;h=b03def134988da8c800adac1a38a41a1f09a1d89

  • https://bugs.ghostscript.com/show_bug.cgi?id=698830

  • https://bugs.ghostscript.com/show_bug.cgi?id=698965

  • https://lists.debian.org/debian-lts/2018/03/msg00043.html

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 8 лет назад

pdf_load_obj_stm in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 could reference the object stream recursively and therefore run out of error stack, which allows remote attackers to cause a denial of service via a crafted PDF document.

CVSS3: 5.5
nvd
около 8 лет назад

pdf_load_obj_stm in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 could reference the object stream recursively and therefore run out of error stack, which allows remote attackers to cause a denial of service via a crafted PDF document.

CVSS3: 5.5
github
больше 3 лет назад

pdf_load_obj_stm in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 could reference the object stream recursively and therefore run out of error stack, which allows remote attackers to cause a denial of service via a crafted PDF document.

suse-cvrf
почти 8 лет назад

Security update for mupdf