First published: Tue Jul 25 2017(Updated: )
A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the QPDF::resolveObjectsInStream function in QPDF.cc, aka an "infinite loop."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/qpdf | <8.0.2-3~14.04.1 | 8.0.2-3~14.04.1 |
ubuntu/qpdf | <7.0.0-1 | 7.0.0-1 |
ubuntu/qpdf | <8.0.2-3~16.04.1 | 8.0.2-3~16.04.1 |
debian/qpdf | 10.1.0-1 11.3.0-1+deb12u1 11.9.1-1 | |
qpdf | =6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11625 has a severity rating classified as a denial of service vulnerability.
To mitigate CVE-2017-11625, upgrade to QPDF version 8.0.2-3~14.04.1 or later.
CVE-2017-11625 affects QPDF versions 6.0.0 through earlier versions up to 8.0.2-3~14.04.1.
CVE-2017-11625 is a stack-consumption vulnerability that can lead to an infinite loop.
The impact of CVE-2017-11625 is that it allows attackers to create a denial of service condition through crafted files.