19 results (0.006 seconds)

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 1

Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to crash the application via the std::__shared_count() function at /bits/shared_ptr_base.h. La vulnerabilidad de desbordamiento de búfer de almacenamiento dinámico en qpdf 11.9.0 permite a los atacantes bloquear la aplicación a través de la función std::__shared_count() en /bits/shared_ptr_base.h. • https://github.com/qpdf/qpdf/issues/1123 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WLK6ICPJUMOJNHZQWXAA5MPXG5JHZZL https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX3D3YCNS6CQL3774OFUROLP3EM25ILC https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3N6TULMEYVCLXO47Y5W4VWCJMSB72CB • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in QPDF version 10.0.4, allows remote attackers to execute arbitrary code via crafted .pdf file to Pl_ASCII85Decoder::write parameter in libqpdf. • https://github.com/qpdf/qpdf/issues/492 https://lists.debian.org/debian-lts-announce/2023/08/msg00037.html • CWE-416: Use After Free •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

QPDF v8.4.2 was discovered to contain a heap buffer overflow via the function QPDF::processXRefStream. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted PDF file. Se ha detectado que QPDF versión v8.4.2, contiene un desbordamiento del búfer de la pila por medio de la función QPDF::processXRefStream. Esta vulnerabilidad permite a atacantes causar una denegación de servicio (DoS) por medio de un archivo PDF diseñado • https://github.com/qpdf/qpdf/issues/701 • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

QPDF 9.x through 9.1.1 and 10.x through 10.0.4 has a heap-based buffer overflow in Pl_ASCII85Decoder::write (called from Pl_AES_PDF::flush and Pl_AES_PDF::finish) when a certain downstream write fails. QPDF versiones 9.x hasta 9.1.1 y versiones 10.x hasta 10.0.4, presenta un desbordamiento de búfer en la región heap de la memoria en la función Pl_ASCII85Decoder::write (llamado desde Pl_AES_PDF::flush y Pl_AES_PDF::finish) cuando comete un fallo una determinada escritura descendente • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28262 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/qpdf/OSV-2020-2245.yaml https://github.com/qpdf/qpdf/commit/dc92574c10f3e2516ec6445b88c5d584f40df4e5 https://github.com/qpdf/qpdf/issues/492 https://lists.debian.org/debian-lts-announce/2023/08/msg00037.html https://security.gentoo.org/glsa/202401-20 • CWE-787: Out-of-bounds Write •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

In QPDF 8.2.1, in libqpdf/QPDFWriter.cc, QPDFWriter::unparseObject and QPDFWriter::unparseChild have recursive calls for a long time, which allows remote attackers to cause a denial of service via a crafted PDF file. En QPDF 8.2.1, en libqpdf/QPDFWriter.cc, QPDFWriter::unparseObject y QPDFWriter::unparseChild tienen llamadas recursivas durante mucho tiempo, lo que permite que atacantes remotos provoquen una denegación de servicio (DoS) mediante un archivo PDF manipulado. • https://github.com/qpdf/qpdf/issues/243 https://lists.debian.org/debian-lts-announce/2023/08/msg00037.html • CWE-674: Uncontrolled Recursion •