First published: Tue Jul 25 2017(Updated: )
A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the QPDFTokenizer::resolveLiteral function in QPDFTokenizer.cc after four consecutive calls to QPDFObjectHandle::parseInternal, aka an "infinite loop."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/qpdf | <8.0.2-3~14.04.1 | 8.0.2-3~14.04.1 |
ubuntu/qpdf | <7.0.0-1 | 7.0.0-1 |
ubuntu/qpdf | <8.0.2-3~16.04.1 | 8.0.2-3~16.04.1 |
debian/qpdf | 10.1.0-1 11.3.0-1+deb12u1 11.9.1-1 | |
qpdf | =6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11626 has a severity rating that suggests it can lead to denial of service due to stack consumption.
To fix CVE-2017-11626, update QPDF to version 8.0.2-3~14.04.1 or a later version for affected Ubuntu systems.
CVE-2017-11626 affects QPDF version 6.0.0 specifically, along with several older versions of its packages.
CVE-2017-11626 is classified as a stack-consumption vulnerability resulting from improper handling of crafted files.
CVE-2017-11626 impacts systems running specific versions of the QPDF library, including those on Ubuntu and Debian builds.