Artifex MuPDF 1.15.0 has a heap-based buffer overflow in fz_append_display_node located at fitz/list-device.c, allowing remote attackers to execute arbitrary code via a crafted PDF file. This occurs with a large BDC property name that overflows the allocated size of a display list node.
References
Link | Resource |
---|---|
http://git.ghostscript.com/?p=mupdf.git;h=aaf794439e40a2ef544f15b50c20e657414dec7a | Patch Third Party Advisory |
http://git.ghostscript.com/?p=mupdf.git;h=ed19bc806809ad10c4ddce515d375581b86ede85 | Patch Third Party Advisory |
https://bugs.ghostscript.com/show_bug.cgi?id=701118 | Permissions Required Third Party Advisory |
https://archive.today/oi6bm | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUXKCY35PKC32IFHN4RBUCZ75OWEYVJH/ | |
https://lists.debian.org/debian-lts-announce/2020/07/msg00019.html | |
https://www.debian.org/security/2020/dsa-4753 |
Configurations
Information
Published : 2019-07-04 15:15
Updated : 2020-08-29 17:15
NVD link : CVE-2019-13290
Mitre link : CVE-2019-13290
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
artifex
- mupdf