Artifex

Mupdf

69 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.21%
  • Veröffentlicht 21.07.2021 22:15:08
  • Zuletzt bearbeitet 21.11.2024 06:14:53

MuPDF through 1.18.1 has an out-of-bounds write because the cached color converter does not properly consider the maximum key size of a hash table. This can, for example, be seen with crafted "mutool draw" input.

Exploit
  • EPSS 0.31%
  • Veröffentlicht 21.07.2021 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:09:15

Artifex MuPDF before 1.18.0 has a heap based buffer over-write in tiff_expand_colormap() function when parsing TIFF files allowing attackers to cause a denial of service.

  • EPSS 0.65%
  • Veröffentlicht 23.02.2021 23:15:14
  • Zuletzt bearbeitet 21.11.2024 06:21:25

A flaw was found in mupdf 1.18.0. Double free of object during linearization may lead to memory corruption and other potential consequences.

  • EPSS 0.3%
  • Veröffentlicht 09.12.2020 21:15:15
  • Zuletzt bearbeitet 21.11.2024 05:07:11

A Use After Free vulnerability exists in Artifex Software, Inc. MuPDF library 1.17.0-rc1 and earlier when a valid page was followed by a page with invalid pixmap dimensions, causing bander - a static - to point to previously freed memory instead of a...

  • EPSS 0.77%
  • Veröffentlicht 02.10.2020 06:15:12
  • Zuletzt bearbeitet 21.11.2024 05:19:59

Artifex MuPDF before 1.18.0 has a heap based buffer over-write when parsing JBIG2 files allowing attackers to cause a denial of service.

Exploit
  • EPSS 2.48%
  • Veröffentlicht 23.01.2020 22:15:09
  • Zuletzt bearbeitet 21.11.2024 01:44:32

SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file.

Exploit
  • EPSS 0.22%
  • Veröffentlicht 14.08.2019 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:27:48

Artifex MuPDF before 1.16.0 has a heap-based buffer over-read in fz_chartorune in fitz/string.c because pdf/pdf-op-filter.c does not check for a missing string.

Exploit
  • EPSS 1.22%
  • Veröffentlicht 04.07.2019 22:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:38

Artifex MuPDF 1.15.0 has a heap-based buffer overflow in fz_append_display_node located at fitz/list-device.c, allowing remote attackers to execute arbitrary code via a crafted PDF file. This occurs with a large BDC property name that overflows the a...

  • EPSS 2.27%
  • Veröffentlicht 13.06.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:48:00

Usage of an uninitialized variable in the function fz_load_jpeg in Artifex MuPDF 1.14 can result in a heap overflow vulnerability that allows an attacker to execute arbitrary code.

Exploit
  • EPSS 0.21%
  • Veröffentlicht 11.01.2019 05:29:01
  • Zuletzt bearbeitet 21.11.2024 04:46:00

svg-run.c in Artifex MuPDF 1.14.0 has infinite recursion with stack consumption in svg_run_use_symbol, svg_run_element, and svg_run_use, as demonstrated by mutool.