#VU41973 Stack-based buffer overflow in MuPDF - CVE-2014-2013
Published: March 3, 2014 / Updated: May 12, 2023
MuPDF
Artifex Software, Inc.
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the xps_parse_color function in xps/xps-common.c when processing a large number of entries in the ContextColor value of the Fill attribute in a Path element. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://bugs.ghostscript.com/show_bug.cgi?id=694957
- http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00088.html
- http://seclists.org/fulldisclosure/2014/Jan/130
- http://seclists.org/oss-sec/2014/q1/375
- http://secunia.com/advisories/58904
- http://www.debian.org/security/2014/dsa-2951
- http://www.exploit-db.com/exploits/31090
- http://www.hdwsec.fr/blog/mupdf.html
- http://www.osvdb.org/102340
- http://www.securityfocus.com/bid/65036