Page 6 of 31 results (0.008 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Heap-based buffer overflow in the fz_subsample_pixmap function in fitz/pixmap.c in MuPDF 1.10a allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted image. Desbordamiento de búfer basado en pila en la función fz_subsample_pixmap en fitz/pixmap.c en MuPDF 1.10a permite a atacantes remotos provocar una denegación de servicio (lectura fuera de límites y caída) a través de una imagen manipulada. • http://git.ghostscript.com/?p=mupdf.git%3Bh=2c4e5867ee699b1081527bc6c6ea0e99a35a5c27 http://www.debian.org/security/2017/dsa-3797 http://www.openwall.com/lists/oss-security/2017/02/06/3 http://www.openwall.com/lists/oss-security/2017/02/07/1 http://www.securityfocus.com/bid/96139 https://bugs.ghostscript.com/show_bug.cgi?id=697515 https://security.gentoo.org/glsa/201702-12 • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 2%CPEs: 3EXPL: 2

An issue was discovered in Artifex MuPDF before 1912de5f08e90af1d9d0a9791f58ba3afdb9d465. The pdf_run_xobject function in pdf-op-run.c encounters a NULL pointer dereference during a Fitz fz_paint_pixmap_with_mask painting operation. Versions 1.11 and later are unaffected. Se ha descubierto un problema en Artifex MuPDF antes de 1912de5f08e90af1d9d0a9791f58ba3afdb9d465. La función pdf_run_xobject en pdf-op-run.c encuentra una derivación de puntero NULL durante una operación de pintura Fitz fz_paint_pixmap_with_mask. • https://www.exploit-db.com/exploits/42138 http://git.ghostscript.com/?p=mupdf.git%3Bh=1912de5f08e90af1d9d0a9791f58ba3afdb9d465 http://www.debian.org/security/2017/dsa-3797 http://www.securityfocus.com/bid/96213 https://bugs.ghostscript.com/show_bug.cgi?id=697500 https://security.gentoo.org/glsa/201706-08 • CWE-476: NULL Pointer Dereference •

CVSS: 5.5EPSS: 1%CPEs: 3EXPL: 2

Use-after-free vulnerability in the pdf_load_xref function in pdf/pdf-xref.c in MuPDF allows remote attackers to cause a denial of service (crash) via a crafted PDF file. Vulnerabilidad de uso después de liberación en la función pdf_load_xref en pdf/pdf-xref.c en MuPDF permite a atacantes remotos provocar una denegación de servicio (caída) a través de un archivo PDF manipulado. • http://bugs.ghostscript.com/show_bug.cgi?id=696941 http://git.ghostscript.com/?p=mupdf.git%3Bh=fa1936405b6a84e5c9bb440912c23d532772f958 http://lists.opensuse.org/opensuse-updates/2016-08/msg00007.html http://www.debian.org/security/2016/dsa-3655 http://www.openwall.com/lists/oss-security/2016/07/21/7 http://www.securityfocus.com/bid/92071 https://security.gentoo.org/glsa/201702-12 • CWE-416: Use After Free •

CVSS: 9.8EPSS: 6%CPEs: 2EXPL: 0

Heap-based buffer overflow in the pdf_load_mesh_params function in pdf/pdf-shade.c in MuPDF allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a large decode array. Desbordamiento de búfer basado en memoria dinámica en la función pdf_load_mesh_params en pdf/pdf-shade.c en MuPDF permite a atacantes remotos provocar una denegación de servicio (caída) o ejecutar código arbitrario a través de una decodificación array grande. • http://bugs.ghostscript.com/show_bug.cgi?id=696954 http://git.ghostscript.com/?p=mupdf.git%3Bh=39b0f07dd960f34e7e6bf230ffc3d87c41ef0f2e http://www.debian.org/security/2016/dsa-3655 http://www.openwall.com/lists/oss-security/2016/08/03/8 http://www.securityfocus.com/bid/92266 https://security.gentoo.org/glsa/201702-12 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 35%CPEs: 4EXPL: 4

Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. Desbordamiento de buffer basado en pila en la función xps_parse_color en xps/xps-common.c en MuPDF 1.3 y anteriores permite a atacantes remotos ejecutar código arbitrario a través de un número grande de entradas en el valor ContextColor del atributo Fill en un elemento Path. • https://www.exploit-db.com/exploits/31090 http://bugs.ghostscript.com/show_bug.cgi?id=694957 http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=60dabde18d7fe12b19da8b509bdfee9cc886aafc http://lists.opensuse.org/opensuse-updates/2014-02/msg00088.html http://seclists.org/fulldisclosure/2014/Jan/130 http://seclists.org/oss-sec/2014/q1/375 http://secunia.com/advisories/58904 http://www.debian.org/security/2014/dsa-2951 http://www.exploit-db.com/exploits/31090 http://www. • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •