CVE-2017-17858

Heap-based buffer overflow in the ensure_solid_xref function in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 allows a remote attacker to potentially execute arbitrary code via a crafted PDF file, because xref subsection object numbers are unrestricted.
Configurations

Configuration 1 (hide)

cpe:2.3:a:artifex:mupdf:1.12.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:18

Type Values Removed Values Added
References () http://git.ghostscript.com/?p=mupdf.git%3Ba=commit%3Bh=55c3f68d638ac1263a386e0aaa004bb6e8bde731 - () http://git.ghostscript.com/?p=mupdf.git%3Ba=commit%3Bh=55c3f68d638ac1263a386e0aaa004bb6e8bde731 -
References () https://bugs.ghostscript.com/show_bug.cgi?id=698819 - Permissions Required () https://bugs.ghostscript.com/show_bug.cgi?id=698819 - Permissions Required
References () https://github.com/mzet-/Security-Advisories/blob/master/mzet-adv-2017-01.md - Exploit, Patch, Third Party Advisory () https://github.com/mzet-/Security-Advisories/blob/master/mzet-adv-2017-01.md - Exploit, Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/201811-15 - () https://security.gentoo.org/glsa/201811-15 -

07 Nov 2023, 02:41

Type Values Removed Values Added
References
  • {'url': 'http://git.ghostscript.com/?p=mupdf.git;a=commit;h=55c3f68d638ac1263a386e0aaa004bb6e8bde731', 'name': 'http://git.ghostscript.com/?p=mupdf.git;a=commit;h=55c3f68d638ac1263a386e0aaa004bb6e8bde731', 'tags': ['Patch', 'Vendor Advisory'], 'refsource': 'MISC'}
  • () http://git.ghostscript.com/?p=mupdf.git%3Ba=commit%3Bh=55c3f68d638ac1263a386e0aaa004bb6e8bde731 -

Information

Published : 2018-01-22 15:29

Updated : 2024-11-21 03:18


NVD link : CVE-2017-17858

Mitre link : CVE-2017-17858

CVE.ORG link : CVE-2017-17858


JSON object : View

Products Affected

artifex

  • mupdf
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer