Heap-based buffer overflow in the ensure_solid_xref function in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 allows a remote attacker to potentially execute arbitrary code via a crafted PDF file, because xref subsection object numbers are unrestricted.
References
Link | Resource |
---|---|
https://github.com/mzet-/Security-Advisories/blob/master/mzet-adv-2017-01.md | Exploit Patch Third Party Advisory |
https://bugs.ghostscript.com/show_bug.cgi?id=698819 | Permissions Required |
http://git.ghostscript.com/?p=mupdf.git;a=commit;h=55c3f68d638ac1263a386e0aaa004bb6e8bde731 | Patch Vendor Advisory |
https://security.gentoo.org/glsa/201811-15 |
Configurations
Information
Published : 2018-01-22 07:29
Updated : 2018-11-27 03:29
NVD link : CVE-2017-17858
Mitre link : CVE-2017-17858
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
artifex
- mupdf