Artifex

Mupdf

66 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.3%
  • Veröffentlicht 09.12.2020 21:15:15
  • Zuletzt bearbeitet 21.11.2024 05:07:11

A Use After Free vulnerability exists in Artifex Software, Inc. MuPDF library 1.17.0-rc1 and earlier when a valid page was followed by a page with invalid pixmap dimensions, causing bander - a static - to point to previously freed memory instead of a...

  • EPSS 0.77%
  • Veröffentlicht 02.10.2020 06:15:12
  • Zuletzt bearbeitet 21.11.2024 05:19:59

Artifex MuPDF before 1.18.0 has a heap based buffer over-write when parsing JBIG2 files allowing attackers to cause a denial of service.

Exploit
  • EPSS 3.37%
  • Veröffentlicht 23.01.2020 22:15:09
  • Zuletzt bearbeitet 21.11.2024 01:44:32

SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file.

Exploit
  • EPSS 0.22%
  • Veröffentlicht 14.08.2019 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:27:48

Artifex MuPDF before 1.16.0 has a heap-based buffer over-read in fz_chartorune in fitz/string.c because pdf/pdf-op-filter.c does not check for a missing string.

Exploit
  • EPSS 1.25%
  • Veröffentlicht 04.07.2019 22:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:38

Artifex MuPDF 1.15.0 has a heap-based buffer overflow in fz_append_display_node located at fitz/list-device.c, allowing remote attackers to execute arbitrary code via a crafted PDF file. This occurs with a large BDC property name that overflows the a...

  • EPSS 2.62%
  • Veröffentlicht 13.06.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:48:00

Usage of an uninitialized variable in the function fz_load_jpeg in Artifex MuPDF 1.14 can result in a heap overflow vulnerability that allows an attacker to execute arbitrary code.

Exploit
  • EPSS 0.21%
  • Veröffentlicht 11.01.2019 05:29:01
  • Zuletzt bearbeitet 21.11.2024 04:46:00

svg-run.c in Artifex MuPDF 1.14.0 has infinite recursion with stack consumption in svg_run_use_symbol, svg_run_element, and svg_run_use, as demonstrated by mutool.

Exploit
  • EPSS 0.19%
  • Veröffentlicht 11.01.2019 05:29:01
  • Zuletzt bearbeitet 21.11.2024 04:45:59

Artifex MuPDF 1.14.0 has a SEGV in the function fz_load_page of the fitz/document.c file, as demonstrated by mutool. This is related to page-number mishandling in cbz/mucbz.c, cbz/muimg.c, and svg/svg-doc.c.

Exploit
  • EPSS 0.44%
  • Veröffentlicht 06.12.2018 00:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:44

In Artifex MuPDF 1.14.0, the svg_run_image function in svg/svg-run.c allows remote attackers to cause a denial of service (href_att NULL pointer dereference and application crash) via a crafted svg file, as demonstrated by mupdf-gl.

Exploit
  • EPSS 0.43%
  • Veröffentlicht 06.12.2018 00:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:44

In Artifex MuPDF 1.14.0, svg/svg-run.c allows remote attackers to cause a denial of service (recursive calls followed by a fitz/xml.c fz_xml_att crash from excessive stack consumption) via a crafted svg file, as demonstrated by mupdf-gl.