← Volver a CVEs
CVE-2018-1000037
MEDIUM5.5
Descripcion
In Artifex MuPDF 1.12.0 and earlier, multiple reachable assertions in the PDF parser allow an attacker to cause a denial of service (assert crash) via a crafted file.
Detalles CVE
Puntuacion CVSS v3.15.5
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado5/24/2018
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
artifex:mupdfdebian:debian_linux
Debilidades (CWE)
CWE-20CWE-20
Referencias
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5490(cve@mitre.org)
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5501(cve@mitre.org)
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5503(cve@mitre.org)
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5511(cve@mitre.org)
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5564(cve@mitre.org)
https://bugs.ghostscript.com/show_bug.cgi?id=698882(cve@mitre.org)
https://bugs.ghostscript.com/show_bug.cgi?id=698886(cve@mitre.org)
https://bugs.ghostscript.com/show_bug.cgi?id=698888(cve@mitre.org)
https://bugs.ghostscript.com/show_bug.cgi?id=698890(cve@mitre.org)
https://security.gentoo.org/glsa/201811-15(cve@mitre.org)
https://www.debian.org/security/2018/dsa-4334(cve@mitre.org)
http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995(af854a3a-2127-422b-91ae-364da2661108)
http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=8a3257b01faa899dd9b5e35c6bb3403cd709c371%3Bhp=de39f005f12a1afc6973c1f5cec362d6545f70cb(af854a3a-2127-422b-91ae-364da2661108)
http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=b2e7d38e845c7d4922d05e6e41f3a2dc1bc1b14a%3Bhp=f51836b9732c38d945b87fda0770009a77ba680c(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5490(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5501(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5503(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5511(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5564(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.ghostscript.com/show_bug.cgi?id=698882(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.ghostscript.com/show_bug.cgi?id=698886(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.ghostscript.com/show_bug.cgi?id=698888(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.ghostscript.com/show_bug.cgi?id=698890(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201811-15(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4334(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.