Lucene search

K
cve[email protected]CVE-2020-6113
HistorySep 17, 2020 - 1:15 p.m.

CVE-2020-6113

2020-09-1713:15:16
CWE-190
CWE-787
CWE-131
web.nvd.nist.gov
25
cve-2020-6113
nitro software
nitro pro
vulnerability
memory corruption
pdf
code execution
nvd

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.067 Low

EPSS

Percentile

93.9%

An exploitable vulnerability exists in the object stream parsing functionality of Nitro Software, Inc.’s Nitro Pro 13.13.2.242 when updating its cross-reference table. When processing an object stream from a PDF document, the application will perform a calculation in order to allocate memory for the list of indirect objects. Due to an error when calculating this size, an integer overflow may occur which can result in an undersized buffer being allocated. Later when initializing this buffer, the application can write outside its bounds which can cause a memory corruption that can lead to code execution. A specially crafted document can be delivered to a victim in order to trigger this vulnerability.

Affected configurations

Vulners
NVD
Node
gonitronitro_proRange13.13.2.242
OR
gonitronitro_proRangeNitro Pro 13.16.2.300
VendorProductVersionCPE
gonitronitro_pro*cpe:2.3:a:gonitro:nitro_pro:*:*:*:*:*:*:*:*
gonitronitro_pro*cpe:2.3:a:gonitro:nitro_pro:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Nitro Pro",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Nitro Pro 13.13.2.242, Nitro Pro 13.16.2.300"
      }
    ]
  }
]

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.067 Low

EPSS

Percentile

93.9%

Related for CVE-2020-6113