First published: Wed Dec 09 2020(Updated: )
A Use After Free vulnerability exists in Artifex Software, Inc. MuPDF library 1.17.0-rc1 and earlier when a valid page was followed by a page with invalid pixmap dimensions, causing bander - a static - to point to previously freed memory instead of a newband_writer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex Mupdf | <=1.16.1 | |
Artifex Mupdf | =1.17.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-16600 is high with a CVSS score of 7.8.
The Use After Free vulnerability in CVE-2020-16600 occurs when a valid page is followed by a page with invalid pixmap dimensions, causing bander to point to previously freed memory.
CVE-2020-16600 affects Artifex Software, Inc. MuPDF library versions up to and including 1.16.1 and version 1.17.0-rc1.
Yes, there are references available for CVE-2020-16600. You can find them at the following links: [Link 1](http://git.ghostscript.com/?p=mupdf.git;h=96751b25462f83d6e16a9afaf8980b0c3f979c8b) and [Link 2](https://bugs.ghostscript.com/show_bug.cgi?id=702253)
The Common Weakness Enumeration (CWE) for CVE-2020-16600 is CWE-416.