PDFio is a C library for reading and writing PDF files. In versions prior to 1.1.0 a denial of service (DOS) vulnerability exists in the pdfio parser. Crafted pdf files can cause the program to run at 100% utilization and never terminate. The pdf which causes this crash found in testing is about 28kb in size and was discovered via fuzzing. Anyone who uses this library either as a standalone binary or as a library can be DOSed when attempting to parse this type of file. Web servers or other automated processes which rely on this code to turn pdf submissions into plaintext can be DOSed when an attacker uploads the pdf. Please see the linked GHSA for an example pdf. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/michaelrsweet/pdfio/commit/4f10021e7ee527c1aa24853e2947e38e154d9ccb | Patch Third Party Advisory |
https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-cjc4-x96x-fvgf | Exploit Third Party Advisory |
https://github.com/michaelrsweet/pdfio/commit/4f10021e7ee527c1aa24853e2947e38e154d9ccb | Patch Third Party Advisory |
https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-cjc4-x96x-fvgf | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:48
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
References | () https://github.com/michaelrsweet/pdfio/commit/4f10021e7ee527c1aa24853e2947e38e154d9ccb - Patch, Third Party Advisory | |
References | () https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-cjc4-x96x-fvgf - Exploit, Third Party Advisory |
07 Nov 2023, 04:08
Type | Values Removed | Values Added |
---|---|---|
Summary | PDFio is a C library for reading and writing PDF files. In versions prior to 1.1.0 a denial of service (DOS) vulnerability exists in the pdfio parser. Crafted pdf files can cause the program to run at 100% utilization and never terminate. The pdf which causes this crash found in testing is about 28kb in size and was discovered via fuzzing. Anyone who uses this library either as a standalone binary or as a library can be DOSed when attempting to parse this type of file. Web servers or other automated processes which rely on this code to turn pdf submissions into plaintext can be DOSed when an attacker uploads the pdf. Please see the linked GHSA for an example pdf. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
Information
Published : 2023-02-07 01:15
Updated : 2024-11-21 07:48
NVD link : CVE-2023-24808
Mitre link : CVE-2023-24808
CVE.ORG link : CVE-2023-24808
JSON object : View
Products Affected
pdfio_project
- pdfio
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')