In Artifex MuPDF 1.12.0 and earlier, multiple use of uninitialized value bugs in the PDF parser could allow an attacker to cause a denial of service (crash) or influence program flow via a crafted file.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201811-15 | third party advisory vendor advisory |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5596 | issue tracking exploit |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5600 | issue tracking exploit |
https://www.debian.org/security/2018/dsa-4334 | third party advisory vendor advisory |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5610 | issue tracking exploit |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5609 | issue tracking patch exploit third party advisory |
http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=83d4dae44c71816c084a635550acc1a51529b881%3Bhp=f597300439e62f5e921f0d7b1e880b5c1a1f1607 | |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5603 | issue tracking exploit |
https://bugs.ghostscript.com/show_bug.cgi?id=699086 | |
https://bugs.ghostscript.com/show_bug.cgi?id=698904 | |
https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=ace9e69017c08e1e4ce5912014177414c0382004 |