Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2018-1000051 |
CWE-ID | CWE-416 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
mupdf (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU11490
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2018-1000051
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.
The weakness exists in the fz_keep_key_storable due to use-after-free error. A remote attacker can submit a specially crafted PDF file, trigger memory corruption and cause the service to crash or execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
Install update from vendor's website.
Vulnerable software versionsmupdf (Alpine package): 1.12.0-r0
mupdf (Alpine package):
CPE2.3https://git.alpinelinux.org/aports/commit/?id=d9c3c9c209f455ed747c905497cfdbfd57baa2c8
https://git.alpinelinux.org/aports/commit/?id=44edd0a362a97c812a59af6d93f91741ddff47c6
https://git.alpinelinux.org/aports/commit/?id=70bbeef9560773077c355e9816977d9ab61c15c6
https://git.alpinelinux.org/aports/commit/?id=f26e75a18613c396b7491f5210d42a45aefa6031
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.