Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-36464

Опубликовано: 27 июн. 2023
Источник: debian

Описание

pypdf is an open source, pure-python PDF library. In affected versions an attacker may craft a PDF which leads to an infinite loop if `__parse_content_stream` is executed. That is, for example, the case if the user extracted text from such a PDF. This issue was introduced in pull request #969 and resolved in pull request #1828. Users are advised to upgrade. Users unable to upgrade may modify the line `while peek not in (b"\r", b"\n")` in `pypdf/generic/_data_structures.py` to `while peek not in (b"\r", b"\n", b"")`.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pypdffixed3.17.4-1package
pypdffixed3.4.1-1+deb12u1bookwormpackage
pypdf2fixed2.12.1-4package
pypdf2fixed2.12.1-3+deb12u1bookwormpackage
pypdf2not-affectedbullseyepackage
pypdf2not-affectedbusterpackage

Примечания

  • https://github.com/py-pdf/pypdf/security/advisories/GHSA-4vvm-4w3v-6mr8

  • Introduced with: https://github.com/py-pdf/pypdf/pull/969 (2.2.0)

  • Fixed with: https://github.com/py-pdf/pypdf/pull/1828

  • Fixed by: https://github.com/py-pdf/pypdf/commit/b0e5c689df689ab173df84dacd77b6fc3c161932 (3.9.0)

Связанные уязвимости

CVSS3: 6.2
ubuntu
больше 2 лет назад

pypdf is an open source, pure-python PDF library. In affected versions an attacker may craft a PDF which leads to an infinite loop if `__parse_content_stream` is executed. That is, for example, the case if the user extracted text from such a PDF. This issue was introduced in pull request #969 and resolved in pull request #1828. Users are advised to upgrade. Users unable to upgrade may modify the line `while peek not in (b"\r", b"\n")` in `pypdf/generic/_data_structures.py` to `while peek not in (b"\r", b"\n", b"")`.

CVSS3: 6.2
redhat
больше 2 лет назад

pypdf is an open source, pure-python PDF library. In affected versions an attacker may craft a PDF which leads to an infinite loop if `__parse_content_stream` is executed. That is, for example, the case if the user extracted text from such a PDF. This issue was introduced in pull request #969 and resolved in pull request #1828. Users are advised to upgrade. Users unable to upgrade may modify the line `while peek not in (b"\r", b"\n")` in `pypdf/generic/_data_structures.py` to `while peek not in (b"\r", b"\n", b"")`.

CVSS3: 6.2
nvd
больше 2 лет назад

pypdf is an open source, pure-python PDF library. In affected versions an attacker may craft a PDF which leads to an infinite loop if `__parse_content_stream` is executed. That is, for example, the case if the user extracted text from such a PDF. This issue was introduced in pull request #969 and resolved in pull request #1828. Users are advised to upgrade. Users unable to upgrade may modify the line `while peek not in (b"\r", b"\n")` in `pypdf/generic/_data_structures.py` to `while peek not in (b"\r", b"\n", b"")`.

CVSS3: 6.2
github
больше 2 лет назад

pypdf and PyPDF2 possible Infinite Loop when a comment isn't followed by a character

CVSS3: 5.5
fstec
больше 3 лет назад

Уязвимость библиотек Python для работы с PDF файлами PyPDF и PyPDF2, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании