The build_filter_chain function in pdf/pdf-stream.c in Artifex MuPDF before 2017-09-25 mishandles a certain case where a variable may reside in a register, which allows remote attackers to cause a denial of service (Fitz fz_drop_imp use-after-free and application crash) or possibly have unspecified other impact via a crafted PDF document.
References
Link | Resource |
---|---|
http://git.ghostscript.com/?p=mupdf.git%3Bh=c2663e51238ec8256da7fc61ad580db891d9fe9a | |
https://bugs.ghostscript.com/show_bug.cgi?id=698592 | Issue Tracking Third Party Advisory |
http://git.ghostscript.com/?p=mupdf.git%3Bh=c2663e51238ec8256da7fc61ad580db891d9fe9a | |
https://bugs.ghostscript.com/show_bug.cgi?id=698592 | Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 03:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.ghostscript.com/?p=mupdf.git%3Bh=c2663e51238ec8256da7fc61ad580db891d9fe9a - | |
References | () https://bugs.ghostscript.com/show_bug.cgi?id=698592 - Issue Tracking, Third Party Advisory |
07 Nov 2023, 02:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-10-16 01:29
Updated : 2024-11-21 03:14
NVD link : CVE-2017-15369
Mitre link : CVE-2017-15369
CVE.ORG link : CVE-2017-15369
JSON object : View
Products Affected
artifex
- mupdf
CWE
CWE-416
Use After Free