CVE-2018-1000039

In Artifex MuPDF 1.12.0 and earlier, multiple heap use after free bugs in the PDF parser could allow an attacker to execute arbitrary code, read memory, or cause a denial of service via a crafted file.
References
Link Resource
http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=4dcc6affe04368461310a21238f7e1871a752a05%3Bhp=8ec561d1bccc46e9db40a9f61310cd8b3763914e
http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995
http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=f597300439e62f5e921f0d7b1e880b5c1a1f1607%3Bhp=093fc3b098dc5fadef5d8ad4b225db9fb124758b
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5492 Exploit Issue Tracking Patch Third Party Advisory
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5513 Exploit Issue Tracking Patch Third Party Advisory
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5521 Exploit Issue Tracking Patch Third Party Advisory
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5604 Exploit Issue Tracking Third Party Advisory
https://bugs.ghostscript.com/show_bug.cgi?id=698883
https://bugs.ghostscript.com/show_bug.cgi?id=698888
https://bugs.ghostscript.com/show_bug.cgi?id=698891
https://bugs.ghostscript.com/show_bug.cgi?id=698892
https://bugs.ghostscript.com/show_bug.cgi?id=698901
https://security.gentoo.org/glsa/201811-15 Third Party Advisory
http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=4dcc6affe04368461310a21238f7e1871a752a05%3Bhp=8ec561d1bccc46e9db40a9f61310cd8b3763914e
http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995
http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=f597300439e62f5e921f0d7b1e880b5c1a1f1607%3Bhp=093fc3b098dc5fadef5d8ad4b225db9fb124758b
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5492 Exploit Issue Tracking Patch Third Party Advisory
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5513 Exploit Issue Tracking Patch Third Party Advisory
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5521 Exploit Issue Tracking Patch Third Party Advisory
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5604 Exploit Issue Tracking Third Party Advisory
https://bugs.ghostscript.com/show_bug.cgi?id=698883
https://bugs.ghostscript.com/show_bug.cgi?id=698888
https://bugs.ghostscript.com/show_bug.cgi?id=698891
https://bugs.ghostscript.com/show_bug.cgi?id=698892
https://bugs.ghostscript.com/show_bug.cgi?id=698901
https://security.gentoo.org/glsa/201811-15 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:artifex:mupdf:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-05-24 13:29

Updated : 2024-11-21 03:39


NVD link : CVE-2018-1000039

Mitre link : CVE-2018-1000039

CVE.ORG link : CVE-2018-1000039


JSON object : View

Products Affected

artifex

  • mupdf
CWE
CWE-416

Use After Free