pdf_load_obj_stm in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 could reference the object stream recursively and therefore run out of error stack, which allows remote attackers to cause a denial of service via a crafted PDF document.
The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201811-15 | third party advisory vendor advisory |
https://bugs.ghostscript.com/show_bug.cgi?id=698965 | third party advisory issue tracking exploit |
https://www.debian.org/security/2018/dsa-4152 | third party advisory vendor advisory |
http://git.ghostscript.com/?p=mupdf.git%3Bh=26527eef77b3e51c2258c8e40845bfbc015e405d | |
http://git.ghostscript.com/?p=mupdf.git%3Bh=b03def134988da8c800adac1a38a41a1f09a1d89 | |
https://bugs.ghostscript.com/show_bug.cgi?id=698830 | third party advisory issue tracking permissions required |