Heap-based buffer overflow in the ensure_solid_xref function in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 allows a remote attacker to potentially execute arbitrary code via a crafted PDF file, because xref subsection object numbers are unrestricted.
References
Link | Resource |
---|---|
http://git.ghostscript.com/?p=mupdf.git%3Ba=commit%3Bh=55c3f68d638ac1263a386e0aaa004bb6e8bde731 | |
https://bugs.ghostscript.com/show_bug.cgi?id=698819 | Permissions Required |
https://github.com/mzet-/Security-Advisories/blob/master/mzet-adv-2017-01.md | Exploit Patch Third Party Advisory |
https://security.gentoo.org/glsa/201811-15 |
Configurations
History
No history.
Information
Published : 2018-01-22 15:29
Updated : 2024-02-04 19:46
NVD link : CVE-2017-17858
Mitre link : CVE-2017-17858
CVE.ORG link : CVE-2017-17858
JSON object : View
Products Affected
artifex
- mupdf
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer