pypdf is a pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files. An attacker who uses this vulnerability can craft a PDF which leads to unexpected long runtime. This quadratic runtime blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. This issue has been addressed in PR 808 and versions from 1.27.9 include this fix. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/py-pdf/pypdf/issues/582 | Exploit Issue Tracking Vendor Advisory |
https://github.com/py-pdf/pypdf/pull/808 | Patch |
https://github.com/py-pdf/pypdf/security/advisories/GHSA-jrm6-h9cq-8gqw | Exploit Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/07/msg00019.html | |
https://github.com/py-pdf/pypdf/issues/582 | Exploit Issue Tracking Vendor Advisory |
https://github.com/py-pdf/pypdf/pull/808 | Patch |
https://github.com/py-pdf/pypdf/security/advisories/GHSA-jrm6-h9cq-8gqw | Exploit Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/07/msg00019.html |
Configurations
History
21 Nov 2024, 08:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/py-pdf/pypdf/issues/582 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://github.com/py-pdf/pypdf/pull/808 - Patch | |
References | () https://github.com/py-pdf/pypdf/security/advisories/GHSA-jrm6-h9cq-8gqw - Exploit, Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/07/msg00019.html - | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.2 |
14 Jul 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jul 2023, 16:28
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:* | |
First Time |
Pypdf Project
Pypdf Project pypdf |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | (MISC) https://github.com/py-pdf/pypdf/pull/808 - Patch | |
References | (MISC) https://github.com/py-pdf/pypdf/issues/582 - Exploit, Issue Tracking, Vendor Advisory | |
References | (MISC) https://github.com/py-pdf/pypdf/security/advisories/GHSA-jrm6-h9cq-8gqw - Exploit, Patch, Vendor Advisory |
30 Jun 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-30 19:15
Updated : 2024-11-21 08:10
NVD link : CVE-2023-36810
Mitre link : CVE-2023-36810
CVE.ORG link : CVE-2023-36810
JSON object : View
Products Affected
pypdf_project
- pypdf
CWE
CWE-407
Inefficient Algorithmic Complexity