Vulnerabilities > CVE-2016-8674 - Use After Free vulnerability in Artifex Mupdf
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
The pdf_to_num function in pdf-object.c in MuPDF before 1.10 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted file.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-3797.NASL |
description | Multiple vulnerabilities have been found in the PDF viewer MuPDF, which may result in denial of service or the execution of arbitrary code if a malformed PDF file is opened. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 97442 |
published | 2017-03-01 |
reporter | This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/97442 |
title | Debian DSA-3797-1 : mupdf - security update |
code |
|
References
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=1e03c06456d997435019fb3526fa2d4be7dbc6ec
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=1e03c06456d997435019fb3526fa2d4be7dbc6ec
- http://www.debian.org/security/2017/dsa-3797
- http://www.debian.org/security/2017/dsa-3797
- http://www.openwall.com/lists/oss-security/2016/10/16/8
- http://www.openwall.com/lists/oss-security/2016/10/16/8
- http://www.securityfocus.com/bid/93127
- http://www.securityfocus.com/bid/93127
- https://blogs.gentoo.org/ago/2016/09/22/mupdf-use-after-free-in-pdf_to_num-pdf-object-c/
- https://blogs.gentoo.org/ago/2016/09/22/mupdf-use-after-free-in-pdf_to_num-pdf-object-c/
- https://bugs.ghostscript.com/show_bug.cgi?id=697015
- https://bugs.ghostscript.com/show_bug.cgi?id=697015
- https://bugs.ghostscript.com/show_bug.cgi?id=697019
- https://bugs.ghostscript.com/show_bug.cgi?id=697019
- https://bugzilla.redhat.com/show_bug.cgi?id=1385685
- https://bugzilla.redhat.com/show_bug.cgi?id=1385685