CVE-2023-36810

pypdf is a pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files. An attacker who uses this vulnerability can craft a PDF which leads to unexpected long runtime. This quadratic runtime blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. This issue has been addressed in PR 808 and versions from 1.27.9 include this fix. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:10

Type Values Removed Values Added
References () https://github.com/py-pdf/pypdf/issues/582 - Exploit, Issue Tracking, Vendor Advisory () https://github.com/py-pdf/pypdf/issues/582 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/py-pdf/pypdf/pull/808 - Patch () https://github.com/py-pdf/pypdf/pull/808 - Patch
References () https://github.com/py-pdf/pypdf/security/advisories/GHSA-jrm6-h9cq-8gqw - Exploit, Patch, Vendor Advisory () https://github.com/py-pdf/pypdf/security/advisories/GHSA-jrm6-h9cq-8gqw - Exploit, Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2023/07/msg00019.html - () https://lists.debian.org/debian-lts-announce/2023/07/msg00019.html -
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 6.2

14 Jul 2023, 23:15

Type Values Removed Values Added
References
  • (MISC) https://lists.debian.org/debian-lts-announce/2023/07/msg00019.html -

10 Jul 2023, 16:28

Type Values Removed Values Added
CPE cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:*
First Time Pypdf Project
Pypdf Project pypdf
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References (MISC) https://github.com/py-pdf/pypdf/pull/808 - (MISC) https://github.com/py-pdf/pypdf/pull/808 - Patch
References (MISC) https://github.com/py-pdf/pypdf/issues/582 - (MISC) https://github.com/py-pdf/pypdf/issues/582 - Exploit, Issue Tracking, Vendor Advisory
References (MISC) https://github.com/py-pdf/pypdf/security/advisories/GHSA-jrm6-h9cq-8gqw - (MISC) https://github.com/py-pdf/pypdf/security/advisories/GHSA-jrm6-h9cq-8gqw - Exploit, Patch, Vendor Advisory

30 Jun 2023, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-30 19:15

Updated : 2024-11-21 08:10


NVD link : CVE-2023-36810

Mitre link : CVE-2023-36810

CVE.ORG link : CVE-2023-36810


JSON object : View

Products Affected

pypdf_project

  • pypdf
CWE
CWE-407

Inefficient Algorithmic Complexity