Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qmv4-vpv5-c294

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Artifex MuPDF 1.15.0 has a heap-based buffer overflow in fz_append_display_node located at fitz/list-device.c, allowing remote attackers to execute arbitrary code via a crafted PDF file. This occurs with a large BDC property name that overflows the allocated size of a display list node.

Artifex MuPDF 1.15.0 has a heap-based buffer overflow in fz_append_display_node located at fitz/list-device.c, allowing remote attackers to execute arbitrary code via a crafted PDF file. This occurs with a large BDC property name that overflows the allocated size of a display list node.

EPSS

Процентиль: 79%
0.01248
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 6 лет назад

Artifex MuPDF 1.15.0 has a heap-based buffer overflow in fz_append_display_node located at fitz/list-device.c, allowing remote attackers to execute arbitrary code via a crafted PDF file. This occurs with a large BDC property name that overflows the allocated size of a display list node.

CVSS3: 7.8
nvd
больше 6 лет назад

Artifex MuPDF 1.15.0 has a heap-based buffer overflow in fz_append_display_node located at fitz/list-device.c, allowing remote attackers to execute arbitrary code via a crafted PDF file. This occurs with a large BDC property name that overflows the allocated size of a display list node.

CVSS3: 7.8
debian
больше 6 лет назад

Artifex MuPDF 1.15.0 has a heap-based buffer overflow in fz_append_dis ...

CVSS3: 6.3
fstec
около 7 лет назад

Уязвимость функции fz_append_display_node программы просмотра PDF-файлов Artifex MuPDF, вызванная переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 79%
0.01248
Низкий