In MuPDF 1.12.0 and earlier, a stack buffer overflow in function pdf_lookup_cmap_full in pdf/pdf-cmap.c could allow an attacker to execute arbitrary code via a crafted file.
References
Link | Resource |
---|---|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5494 | Exploit Issue Tracking Patch Third Party Advisory |
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=f597300439e62f5e921f0d7b1e880b5c1a1f1607;hp=093fc3b098dc5fadef5d8ad4b225db9fb124758b | Patch |
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=71ceebcf56e682504da22c4035b39a2d451e8ffd;hp=7f82c01523505052615492f8e220f4348ba46995 | Patch |
https://security.gentoo.org/glsa/201811-15 | Third Party Advisory |
Configurations
Information
Published : 2018-05-24 06:29
Updated : 2020-08-24 10:37
NVD link : CVE-2018-1000038
Mitre link : CVE-2018-1000038
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
artifex
- mupdf