pdf_load_obj_stm in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 could reference the object stream recursively and therefore run out of error stack, which allows remote attackers to cause a denial of service via a crafted PDF document.
References
Link | Resource |
---|---|
https://bugs.ghostscript.com/show_bug.cgi?id=698965 | Exploit Issue Tracking Third Party Advisory |
https://bugs.ghostscript.com/show_bug.cgi?id=698830 | Issue Tracking Permissions Required Third Party Advisory |
http://git.ghostscript.com/?p=mupdf.git;h=b03def134988da8c800adac1a38a41a1f09a1d89 | Issue Tracking Patch Third Party Advisory |
http://git.ghostscript.com/?p=mupdf.git;h=26527eef77b3e51c2258c8e40845bfbc015e405d | Issue Tracking Patch Third Party Advisory |
https://www.debian.org/security/2018/dsa-4152 | Third Party Advisory |
https://security.gentoo.org/glsa/201811-15 | Third Party Advisory |
Information
Published : 2018-02-02 01:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-6544
Mitre link : CVE-2018-6544
JSON object : View
CWE
CWE-674
Uncontrolled Recursion
Products Affected
debian
- debian_linux
artifex
- mupdf