Artifex MuPDF 1.15.0 has a heap-based buffer overflow in fz_append_display_node located at fitz/list-device.c, allowing remote attackers to execute arbitrary code via a crafted PDF file. This occurs with a large BDC property name that overflows the allocated size of a display list node.
CPE | Name | Operator | Version |
---|---|---|---|
mupdf | eq | 1.6-ios-rc2 | |
mupdf | eq | 1.12.0 | |
mupdf | eq | 1.2 | |
mupdf | eq | 1.9-rc2 | |
mupdf | eq | 1.5-ios-appstore | |
mupdf | eq | 1.5-ios-rc7 | |
mupdf | eq | 1.15.0-rc1 | |
mupdf | eq | 0.1 | |
mupdf | eq | 1.10 | |
mupdf | eq | 0.9 |
git.ghostscript.com/?p=mupdf.git%3Bh=aaf794439e40a2ef544f15b50c20e657414dec7a
git.ghostscript.com/?p=mupdf.git%3Bh=ed19bc806809ad10c4ddce515d375581b86ede85
archive.today/oi6bm
bugs.ghostscript.com/show_bug.cgi?id=701118
lists.debian.org/debian-lts-announce/2020/07/msg00019.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUXKCY35PKC32IFHN4RBUCZ75OWEYVJH/
www.debian.org/security/2020/dsa-4753