Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wjcc-cq79-p63f

Опубликовано: 31 окт. 2023
Источник: github
Github: Прошло ревью
CVSS3: 5.1

Описание

Possible Infinite Loop when PdfWriter(clone_from) is used with a PDF

Impact

An attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage.

That is, for example, the case when the pypdf-user manipulates an incoming malicious PDF e.g. by merging it with another PDF or by adding annotations.

Patches

The issue was fixed with #2264

Workarounds

If you cannot update your version of pypdf, you should modify pypdf/generic/_data_structures.py just like #2264 did.

Пакеты

Наименование

pypdf

pip
Затронутые версииВерсия исправления

>= 3.7.0, < 3.17.0

3.17.0

EPSS

Процентиль: 26%
0.00089
Низкий

5.1 Medium

CVSS3

Дефекты

CWE-835

Связанные уязвимости

CVSS3: 5.1
ubuntu
больше 2 лет назад

pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions 3.7.0 through 3.16.4 can craft a PDF which leads to an infinite loop. This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. That is, for example, the case when the pypdf-user manipulates an incoming malicious PDF e.g. by merging it with another PDF or by adding annotations. The issue was fixed in version 3.17.0. As a workaround, apply the patch manually by modifying `pypdf/generic/_data_structures.py`.

CVSS3: 5.1
nvd
больше 2 лет назад

pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions 3.7.0 through 3.16.4 can craft a PDF which leads to an infinite loop. This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. That is, for example, the case when the pypdf-user manipulates an incoming malicious PDF e.g. by merging it with another PDF or by adding annotations. The issue was fixed in version 3.17.0. As a workaround, apply the patch manually by modifying `pypdf/generic/_data_structures.py`.

CVSS3: 5.1
debian
больше 2 лет назад

pypdf is a free and open-source pure-python PDF library. An attacker w ...

EPSS

Процентиль: 26%
0.00089
Низкий

5.1 Medium

CVSS3

Дефекты

CWE-835