Vulnerabilities > CVE-2018-16648 - Improper Validation of Array Index vulnerability in Artifex Mupdf 1.13.0
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
In Artifex MuPDF 1.13.0, the fz_append_byte function in fitz/buffer.c allows remote attackers to cause a denial of service (segmentation fault) via a crafted pdf file. This is caused by a pdf/pdf-device.c pdf_dev_alpha array-index underflow.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Overflow Buffers Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
Nessus
NASL family | Fedora Local Security Checks |
NASL id | FEDORA_2018-93558DE1AC.NASL |
description | rebase and bugfixes Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. |
last seen | 2020-06-05 |
modified | 2019-01-03 |
plugin id | 120623 |
published | 2019-01-03 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/120623 |
title | Fedora 29 : mupdf (2018-93558de1ac) |
code |
|
References
- https://bugs.ghostscript.com/show_bug.cgi?id=699685
- https://bugs.ghostscript.com/show_bug.cgi?id=699685
- https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=38f883fe129a5e89306252a4676eaaf4bc968824
- https://lists.debian.org/debian-lts-announce/2020/07/msg00019.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00019.html