In MuPDF 1.12.0 and earlier, multiple use of uninitialized value bugs in the PDF parser could allow an attacker to cause a denial of service (crash) or influence program flow via a crafted file.
References
Link | Resource |
---|---|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5610 | Exploit Issue Tracking |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5609 | Exploit Issue Tracking Patch Third Party Advisory |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5603 | Exploit Issue Tracking |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5600 | Exploit Issue Tracking |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5596 | Exploit Issue Tracking |
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=83d4dae44c71816c084a635550acc1a51529b881;hp=f597300439e62f5e921f0d7b1e880b5c1a1f1607 | Patch |
https://www.debian.org/security/2018/dsa-4334 | Third Party Advisory |
https://security.gentoo.org/glsa/201811-15 | Third Party Advisory |
Information
Published : 2018-05-24 06:29
Updated : 2019-03-14 10:21
NVD link : CVE-2018-1000040
Mitre link : CVE-2018-1000040
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
debian
- debian_linux
artifex
- mupdf