First published: Wed Jan 24 2018(Updated: )
In Artifex MuPDF 1.12.0, there is a heap-based buffer overflow vulnerability in the do_pdf_save_document function in the pdf/pdf-write.c file. Remote attackers could leverage the vulnerability to cause a denial of service via a crafted pdf file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mupdf | 1.14.0+ds1-4+deb10u3 1.14.0+ds1-4+deb10u2 1.17.0+ds1-2 1.17.0+ds1-1.3~deb11u1 1.21.1+ds2-1 1.22.2+ds1-2 | |
Artifex Mupdf | =1.12.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-6187.
The severity of CVE-2018-6187 is medium with a severity value of 5.5.
The vulnerability can be leveraged by remote attackers to cause a denial of service by exploiting a heap-based buffer overflow in the do_pdf_save_document function.
To fix the vulnerability, update Artifex MuPDF to version 1.14.0+ds1-4+deb10u3 or later.
Yes, you can find additional references related to CVE-2018-6187 at the following links: [1] http://www.securityfocus.com/bid/102823, [2] https://bugs.ghostscript.com/show_bug.cgi?id=698908, [3] https://security.gentoo.org/glsa/201811-15