Page 4 of 43 results (0.014 seconds)

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 2

An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Se ha solucionado un desbordamiento de enteros con una validación de entrada mejorada. • https://github.com/jeffssh/CVE-2021-30860 https://github.com/Levilutz/CVE-2021-30860 http://seclists.org/fulldisclosure/2021/Sep/25 http://seclists.org/fulldisclosure/2021/Sep/26 http://seclists.org/fulldisclosure/2021/Sep/27 http://seclists.org/fulldisclosure/2021/Sep/28 http://seclists.org/fulldisclosure/2021/Sep/38 http://seclists.org/fulldisclosure/2021/Sep/39 http://seclists.org/fulldisclosure/2021/Sep/40 http://seclists.org/fulldisclosure/2021/Sep/50 http://ww • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

There is an invalid memory access in the function GfxIndexedColorSpace::mapColorToBase() located in GfxState.cc in Xpdf 4.0.0, as used in pdfalto 0.2. It can be triggered by (for example) sending a crafted pdf file to the pdftops binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. Hay un acceso inválido a la memoria en la función GfxIndexedColorSpace::mapColorToBase(), ubicada en GfxState.cc en Xpdf 4.0.0, tal y como se emplea en pdfalto 0.2. Esto puede desencadenarse, por ejemplo, mediante el envío de un archivo pdf manipulado al binario pdftops. • https://github.com/kermitt2/pdfalto/issues/46 https://research.loginsoft.com/bugs/invalid-memory-access-in-gfxindexedcolorspacemapcolortobase-pdfalto-0-2 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in Xpdf 4.00. XRef::readXRefStream in XRef.cc allows attackers to launch a denial of service (Integer Overflow) via a crafted /Size value in a pdf file, as demonstrated by pdftohtml. This is mainly caused by the program attempting a malloc operation for a large amount of memory. Se ha descubierto un problema en Xpdf 4.00. XRef::readXRefStream en XRef.cc permite que los atacantes lancen una denegación de servicio (desbordamiento de enteros) mediante un valor /Size manipulado en un archivo pdf, tal y como queda demostrado con pdftohtml. • https://exchange.xforce.ibmcloud.com/vulnerabilities/152006 https://forum.xpdfreader.com/viewtopic.php?f=3&t=41219&p=41747#p41747 • CWE-190: Integer Overflow or Wraparound •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in Xpdf 4.00. catalog->getNumPages() in AcroForm.cc allows attackers to launch a denial of service (hang caused by large loop) via a specific pdf file, as demonstrated by pdftohtml. This is mainly caused by a large number after the /Count field in the file. Se ha descubierto un problema en Xpdf 4.00. catalog->getNumPages() en AcroForm.cc permite que los atacantes provoquen una denegación de servicio (bloqueo provocado por un gran bucle) mediante un archivo PDF específico, tal y como queda demostrado con pdftohtml. Esto es provocado principalmente por un número grande tras el campo /Count en el archivo. • https://exchange.xforce.ibmcloud.com/vulnerabilities/152005 https://forum.xpdfreader.com/viewtopic.php?f=3&t=41219&p=41747#p41747 • CWE-834: Excessive Iteration •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

CCITTFaxStream::readRow() in Stream.cc in Xpdf 4.00 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted pdf file, as demonstrated by pdftoppm. CCITTFaxStream::readRow() en Stream.cc en Xpdf 4.00 permite que atacantes remotos provoquen una denegación de servicio (sobrelectura de búfer basada en memoria dinámica o heap) mediante un archivo pdf manipulado, como ha sido demostrado por pdftoppm. • https://forum.xpdfreader.com/viewtopic.php?f=3&t=41217 https://github.com/TeamSeri0us/pocs/tree/master/xpdf/2018_10_16/pdftoppm • CWE-125: Out-of-bounds Read •