pypdf is a pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files. An attacker who uses this vulnerability can craft a PDF which leads to unexpected long runtime. This quadratic runtime blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. This issue has been addressed in PR 808 and versions from 1.27.9 include this fix. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/py-pdf/pypdf/issues/582 | Exploit Issue Tracking Vendor Advisory |
https://github.com/py-pdf/pypdf/pull/808 | Patch |
https://github.com/py-pdf/pypdf/security/advisories/GHSA-jrm6-h9cq-8gqw | Exploit Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/07/msg00019.html |
Configurations
History
14 Jul 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jul 2023, 16:28
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | (MISC) https://github.com/py-pdf/pypdf/security/advisories/GHSA-jrm6-h9cq-8gqw - Exploit, Patch, Vendor Advisory | |
References | (MISC) https://github.com/py-pdf/pypdf/issues/582 - Exploit, Issue Tracking, Vendor Advisory | |
References | (MISC) https://github.com/py-pdf/pypdf/pull/808 - Patch |
03 Jul 2023, 01:10
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-30 19:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-36810
Mitre link : CVE-2023-36810
CVE.ORG link : CVE-2023-36810
JSON object : View
Products Affected
pypdf_project
- pypdf
CWE
CWE-407
Inefficient Algorithmic Complexity