The pdf_to_num function in pdf-object.c in MuPDF before 1.10 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted file.
References
Link | Resource |
---|---|
http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=1e03c06456d997435019fb3526fa2d4be7dbc6ec | |
http://www.debian.org/security/2017/dsa-3797 | |
http://www.openwall.com/lists/oss-security/2016/10/16/8 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/93127 | Third Party Advisory VDB Entry |
https://blogs.gentoo.org/ago/2016/09/22/mupdf-use-after-free-in-pdf_to_num-pdf-object-c/ | Patch Third Party Advisory VDB Entry |
https://bugs.ghostscript.com/show_bug.cgi?id=697015 | Issue Tracking Patch |
https://bugs.ghostscript.com/show_bug.cgi?id=697019 | Issue Tracking Patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1385685 | Issue Tracking Patch |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-02-15T21:00:00
Updated: 2017-11-03T18:57:01
Reserved: 2016-10-15T00:00:00
Link: CVE-2016-8674
JSON object: View
NVD Information
Status : Modified
Published: 2017-02-15T21:59:00.307
Modified: 2023-11-07T02:36:27.590
Link: CVE-2016-8674
JSON object: View
Redhat Information
No data.
CWE