First published: Tue May 23 2017(Updated: )
libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document, related to QPDFObjectHandle::parseInternal, aka qpdf-infiniteloop2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/qpdf | <8.0.2-3~14.04.1 | 8.0.2-3~14.04.1 |
ubuntu/qpdf | <7.0.0-1 | 7.0.0-1 |
ubuntu/qpdf | <8.0.2-3~16.04.1 | 8.0.2-3~16.04.1 |
debian/qpdf | 10.1.0-1 11.3.0-1+deb12u1 11.9.1-1 | |
qpdf | =6.0.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9209 has a moderate severity level due to its potential to cause denial of service.
To fix CVE-2017-9209, upgrade QPDF to version 8.0.2-3~14.04.1 or later.
CVE-2017-9209 affects QPDF version 6.0.0 and prior versions.
CVE-2017-9209 allows remote attackers to trigger infinite recursion and stack consumption through crafted PDF documents.
CVE-2017-9209 affects Ubuntu versions 14.04, 16.04, and 17.10 when using the vulnerable QPDF package.