Use-after-free error in mupdf (Alpine package)



Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-1000051
CWE-ID CWE-416
Exploitation vector Network
Public exploit N/A
Vulnerable software
mupdf (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Use-after-free error

EUVDB-ID: #VU11490

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-1000051

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists in the fz_keep_key_storable due to use-after-free error. A remote attacker can submit a specially crafted PDF file, trigger memory corruption and cause the service to crash or execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Install update from vendor's website.

Vulnerable software versions

mupdf (Alpine package): 1.12.0-r0

mupdf (Alpine package):

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=d9c3c9c209f455ed747c905497cfdbfd57baa2c8
https://git.alpinelinux.org/aports/commit/?id=44edd0a362a97c812a59af6d93f91741ddff47c6
https://git.alpinelinux.org/aports/commit/?id=70bbeef9560773077c355e9816977d9ab61c15c6
https://git.alpinelinux.org/aports/commit/?id=f26e75a18613c396b7491f5210d42a45aefa6031


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###