The build_filter_chain function in pdf/pdf-stream.c in Artifex MuPDF before 2017-09-25 mishandles a certain case where a variable may reside in a register, which allows remote attackers to cause a denial of service (Fitz fz_drop_imp use-after-free and application crash) or possibly have unspecified other impact via a crafted PDF document.
References
Link | Resource |
---|---|
https://bugs.ghostscript.com/show_bug.cgi?id=698592 | Issue Tracking Third Party Advisory |
http://git.ghostscript.com/?p=mupdf.git;h=c2663e51238ec8256da7fc61ad580db891d9fe9a | Issue Tracking Third Party Advisory |
Configurations
Information
Published : 2017-10-15 18:29
Updated : 2017-11-07 05:20
NVD link : CVE-2017-15369
Mitre link : CVE-2017-15369
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
artifex
- mupdf