Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-3044
HistoryJun 02, 2023 - 11:15 p.m.

CVE-2023-3044

2023-06-0223:15:09
Debian Security Bug Tracker
security-tracker.debian.org
10
pdf
xpdf
fuzz testing
divide-by-zero

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

5.1

Confidence

High

EPSS

0.001

Percentile

51.2%

An excessively large PDF page size (found in fuzz testing, unlikely in normal PDF files) can result in a divide-by-zero in Xpdf’s text extraction code. This is related to CVE-2022-30524, but the problem here is caused by a very large page size, rather than by a very large character coordinate.

OSVersionArchitecturePackageVersionFilename
Debian12allxpdf< 3.04+git20220601-1xpdf_3.04+git20220601-1_all.deb
Debian11allxpdf< 3.04+git20210103-3xpdf_3.04+git20210103-3_all.deb
Debian999allxpdf< 3.04+git20240613-1xpdf_3.04+git20240613-1_all.deb
Debian13allxpdf< 3.04+git20240613-1xpdf_3.04+git20240613-1_all.deb

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

5.1

Confidence

High

EPSS

0.001

Percentile

51.2%