First published: Tue Jul 25 2017(Updated: )
A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the QPDFTokenizer::resolveLiteral function in QPDFTokenizer.cc after two consecutive calls to QPDFObjectHandle::parseInternal, aka an "infinite loop."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/qpdf | <8.0.2-3~14.04.1 | 8.0.2-3~14.04.1 |
ubuntu/qpdf | <7.0.0-1 | 7.0.0-1 |
ubuntu/qpdf | <8.0.2-3~16.04.1 | 8.0.2-3~16.04.1 |
debian/qpdf | 10.1.0-1 11.3.0-1+deb12u1 11.9.1-1 | |
qpdf | =6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11624 has a severity rating that indicates it can lead to a denial of service due to stack consumption.
To fix CVE-2017-11624, update to QPDF version 7.0.0-1 or later as specified in the vendor's advisory.
CVE-2017-11624 affects QPDF versions before 7.0.0 and specifically version 6.0.0.
Yes, CVE-2017-11624 can potentially be exploited remotely through crafted files that trigger the vulnerability.
CVE-2017-11624 involves the QPDFTokenizer::resolveLiteral function in the libqpdf library.