CVE-2018-6544

pdf_load_obj_stm in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 could reference the object stream recursively and therefore run out of error stack, which allows remote attackers to cause a denial of service via a crafted PDF document.
References
Link Resource
https://bugs.ghostscript.com/show_bug.cgi?id=698965 Exploit Issue Tracking Third Party Advisory
https://bugs.ghostscript.com/show_bug.cgi?id=698830 Issue Tracking Permissions Required Third Party Advisory
http://git.ghostscript.com/?p=mupdf.git;h=b03def134988da8c800adac1a38a41a1f09a1d89 Issue Tracking Patch Third Party Advisory
http://git.ghostscript.com/?p=mupdf.git;h=26527eef77b3e51c2258c8e40845bfbc015e405d Issue Tracking Patch Third Party Advisory
https://www.debian.org/security/2018/dsa-4152 Third Party Advisory
https://security.gentoo.org/glsa/201811-15 Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:artifex:mupdf:1.12.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Information

Published : 2018-02-02 01:29

Updated : 2019-10-02 17:03


NVD link : CVE-2018-6544

Mitre link : CVE-2018-6544


JSON object : View

CWE
CWE-674

Uncontrolled Recursion

Advertisement

dedicated server usa

Products Affected

debian

  • debian_linux

artifex

  • mupdf