In MuPDF 1.12.0 and earlier, multiple use of uninitialized value bugs in the PDF parser could allow an attacker to cause a denial of service (crash) or influence program flow via a crafted file.
References
Link | Resource |
---|---|
http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=83d4dae44c71816c084a635550acc1a51529b881%3Bhp=f597300439e62f5e921f0d7b1e880b5c1a1f1607 | |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5596 | Exploit Issue Tracking |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5600 | Exploit Issue Tracking |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5603 | Exploit Issue Tracking |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5609 | Exploit Issue Tracking Patch Third Party Advisory |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5610 | Exploit Issue Tracking |
https://security.gentoo.org/glsa/201811-15 | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4334 | Third Party Advisory |
Configurations
History
07 Nov 2023, 02:51
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-05-24 13:29
Updated : 2023-12-10 12:30
NVD link : CVE-2018-1000040
Mitre link : CVE-2018-1000040
CVE.ORG link : CVE-2018-1000040
JSON object : View
Products Affected
artifex
- mupdf
debian
- debian_linux
CWE
CWE-20
Improper Input Validation