First published: Fri Oct 02 2020(Updated: )
Artifex MuPDF before 1.18.0 has a heap based buffer over-write when parsing JBIG2 files allowing attackers to cause a denial of service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mupdf | 1.14.0+ds1-4+deb10u3 1.14.0+ds1-4+deb10u2 1.17.0+ds1-2 1.17.0+ds1-1.3~deb11u1 1.21.1+ds2-1 1.22.2+ds1-2 | |
debian/mupdf | <=1.14.0+ds1-4<=1.17.0+ds1-1<=1.14.0+ds1-1<=1.14.0+ds1-4+deb10u1 | 1.17.0+ds1-1.1 1.14.0+ds1-4+deb10u2 |
Artifex Mupdf | <1.18.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-26519.
The severity of CVE-2020-26519 is high.
The affected software is Artifex MuPDF versions before 1.18.0.
CVE-2020-26519 allows attackers to cause a denial of service by exploiting a heap-based buffer overwrite when parsing JBIG2 files.
To fix CVE-2020-26519, update Artifex MuPDF to version 1.18.0 or newer.