Vulnerabilites related to sumatrapdfreader - sumatrapdf
Vulnerability from fkie_nvd
Published
2009-12-01 00:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple stack-based buffer overflows in pdf_shade4.c in MuPDF before commit 20091125231942, as used in SumatraPDF before 1.0.1, allow remote attackers to cause a denial of service and possibly execute arbitrary code via a /Decode array for certain types of shading that are not properly handled by the (1) pdf_loadtype4shade, (2) pdf_loadtype5shade, (3) pdf_loadtype6shade, and (4) pdf_loadtype7shade functions. NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sumatrapdfreader | sumatrapdf | * | |
sumatrapdfreader | sumatrapdf | 0.1 | |
sumatrapdfreader | sumatrapdf | 0.2 | |
sumatrapdfreader | sumatrapdf | 0.3 | |
sumatrapdfreader | sumatrapdf | 0.4 | |
sumatrapdfreader | sumatrapdf | 0.5 | |
sumatrapdfreader | sumatrapdf | 0.6 | |
sumatrapdfreader | sumatrapdf | 0.7 | |
sumatrapdfreader | sumatrapdf | 0.8 | |
sumatrapdfreader | sumatrapdf | 0.8.1 | |
sumatrapdfreader | sumatrapdf | 0.9 | |
sumatrapdfreader | sumatrapdf | 0.9.1 | |
sumatrapdfreader | sumatrapdf | 0.9.2 | |
sumatrapdfreader | sumatrapdf | 0.9.3 | |
sumatrapdfreader | sumatrapdf | 0.9.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C9B4E19-8BAA-4EC8-9E37-56CEE745DEF0", "versionEndIncluding": "1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3BE8A6DE-5EB6-47C5-BBCA-5ED94783414D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7E763B24-5035-476D-8244-D876707FE4B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "678C49B5-A9F0-4A5C-8CDC-E85E5E509959", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "084084EE-CD7D-4D26-9F92-D6C1363C1127", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "968776E8-58DE-4D07-B81F-69D751E78569", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "22988B78-E426-4885-8B1A-55CD875325BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "8AB75661-4385-4C96-ADA6-5E57DF401CBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3BE3A563-DC97-4B03-939F-E183C612BBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA284413-F016-4604-BFBA-8C26BED5AD75", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4EB1D911-1EA5-4231-8B2C-97B4346B865A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "1640649C-D190-4FB5-BDC5-9A5B89945A18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "568130AC-C49F-4C09-9336-C8E3F454C675", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "76E67580-96C8-4164-88F8-DDA65F901290", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "BBC040EB-4221-4B42-B7F1-426E454BE523", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in pdf_shade4.c in MuPDF before commit 20091125231942, as used in SumatraPDF before 1.0.1, allow remote attackers to cause a denial of service and possibly execute arbitrary code via a /Decode array for certain types of shading that are not properly handled by the (1) pdf_loadtype4shade, (2) pdf_loadtype5shade, (3) pdf_loadtype6shade, and (4) pdf_loadtype7shade functions. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Multiples desbordamientos de b\u00fafer basados en pila en pdf_shade4.c de MuPDF en versiones anteriores a commit 20091125231942, y como es utilizado en SumatraPDF en versiones anteriores a la v1.0.1, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un array /Decode para ciertos tipos de sombreado que no son apropiadamente manejados por las funciones (1) pdf_loadtype4shade, (2) pdf_loadtype5shade, (3) pdf_loadtype6shade, y (4) pdf_loadtype7shade. NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceras partes." } ], "id": "CVE-2009-4117", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-12-01T00:30:00.217", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0330.html" }, { "source": "cve@mitre.org", "url": "http://blog.kowalczyk.info/software/sumatrapdf/news.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37494" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37513" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3355" }, { "source": "cve@mitre.org", "url": "https://bugs.ghostscript.com/show_bug.cgi?id=708030" }, { "source": "cve@mitre.org", "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=a21cc1548993c392e474817bb3d656eb3730d88f" }, { "source": "cve@mitre.org", "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=cf6860c3d70a2f7a63cdb621cc3b58c891915deb" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54441" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0330.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blog.kowalczyk.info/software/sumatrapdf/news.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37494" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37513" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3355" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54441" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-05 10:51
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4896.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sumatrapdfreader | sumatrapdf | * | |
sumatrapdfreader | sumatrapdf | 0.1 | |
sumatrapdfreader | sumatrapdf | 0.2 | |
sumatrapdfreader | sumatrapdf | 0.3 | |
sumatrapdfreader | sumatrapdf | 0.4 | |
sumatrapdfreader | sumatrapdf | 0.5 | |
sumatrapdfreader | sumatrapdf | 0.6 | |
sumatrapdfreader | sumatrapdf | 0.7 | |
sumatrapdfreader | sumatrapdf | 0.8 | |
sumatrapdfreader | sumatrapdf | 0.8.1 | |
sumatrapdfreader | sumatrapdf | 0.9 | |
sumatrapdfreader | sumatrapdf | 0.9.1 | |
sumatrapdfreader | sumatrapdf | 0.9.2 | |
sumatrapdfreader | sumatrapdf | 0.9.3 | |
sumatrapdfreader | sumatrapdf | 0.9.4 | |
sumatrapdfreader | sumatrapdf | 1.0 | |
sumatrapdfreader | sumatrapdf | 1.0.1 | |
sumatrapdfreader | sumatrapdf | 1.1 | |
sumatrapdfreader | sumatrapdf | 1.2 | |
sumatrapdfreader | sumatrapdf | 1.3 | |
sumatrapdfreader | sumatrapdf | 1.4 | |
sumatrapdfreader | sumatrapdf | 1.5 | |
sumatrapdfreader | sumatrapdf | 1.5.1 | |
sumatrapdfreader | sumatrapdf | 1.6 | |
sumatrapdfreader | sumatrapdf | 1.7 | |
sumatrapdfreader | sumatrapdf | 1.8 | |
sumatrapdfreader | sumatrapdf | 1.9 | |
sumatrapdfreader | sumatrapdf | 2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:*:*:*:*:*:*:*:*", "matchCriteriaId": "299C459F-4883-43D1-ADC2-2ABF4EFFC3EF", "versionEndIncluding": "2.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3BE8A6DE-5EB6-47C5-BBCA-5ED94783414D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7E763B24-5035-476D-8244-D876707FE4B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "678C49B5-A9F0-4A5C-8CDC-E85E5E509959", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "084084EE-CD7D-4D26-9F92-D6C1363C1127", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "968776E8-58DE-4D07-B81F-69D751E78569", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "22988B78-E426-4885-8B1A-55CD875325BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "8AB75661-4385-4C96-ADA6-5E57DF401CBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3BE3A563-DC97-4B03-939F-E183C612BBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA284413-F016-4604-BFBA-8C26BED5AD75", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4EB1D911-1EA5-4231-8B2C-97B4346B865A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "1640649C-D190-4FB5-BDC5-9A5B89945A18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "568130AC-C49F-4C09-9336-C8E3F454C675", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "76E67580-96C8-4164-88F8-DDA65F901290", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "BBC040EB-4221-4B42-B7F1-426E454BE523", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B3A05EB-7BA4-4D32-98E7-EC79CAAC3217", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3EBD432D-01A8-4680-A553-777EC277B992", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8959B7F1-C650-4B83-88C0-1C31CAEF88FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DA6C438D-F32D-49AB-9493-80CC602AAB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AFD3EFF-6141-41C9-BB7D-0D11282E3FBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "AA495E2F-FD32-4868-9CC2-5880E1BE0AC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "BEE15BF5-8776-45D1-A9B5-8C680238F107", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "33DB6436-B488-4C61-892A-172075B4C87E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "20D9D791-339F-42B7-9A50-77813F169865", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "74ACF178-B699-4354-8C37-87E5DF9F1686", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "F621DA97-0D9C-4316-AA50-82879F571971", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "32AE7E0E-09A4-40D8-896F-27CDD34C964E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "98ADA8F1-A080-4558-81CA-D9D3241E1327", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4896." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en SumatraPDF antes de v2.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un documento PDF modificado, una vulnerabilidad diferente a CVE-2012-4896." } ], "id": "CVE-2012-4895", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-10-05T10:51:16.083", "references": [ { "source": "cve@mitre.org", "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/50656" }, { "source": "cve@mitre.org", "url": "http://technet.microsoft.com/security/msvr/msvr12-014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://technet.microsoft.com/security/msvr/msvr12-014" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-07-26 20:15
Modified
2024-11-21 08:06
Severity ?
Summary
A buffer overflow in SumatraPDF Reader v3.4.6 allows attackers to cause a Denial of Service (DoS) via a crafted text file.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/CDACesec/CVE-2023-33802 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/CDACesec/CVE-2023-33802 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sumatrapdfreader | sumatrapdf | 3.4.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:3.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "8E57C2A0-4153-4F8A-8FFD-0839E14C4743", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow in SumatraPDF Reader v3.4.6 allows attackers to cause a Denial of Service (DoS) via a crafted text file." } ], "id": "CVE-2023-33802", "lastModified": "2024-11-21T08:06:02.003", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-26T20:15:12.613", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CDACesec/CVE-2023-33802" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CDACesec/CVE-2023-33802" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-23 22:15
Modified
2024-11-21 01:44
Severity ?
Summary
SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.exploit-db.com/exploits/23246 | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://bugs.ghostscript.com/show_bug.cgi?id=693371 | ||
cve@mitre.org | https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=f919270b6a732ff45c3ba2d0c105e2b39e9c9bc9 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.exploit-db.com/exploits/23246 | Exploit, Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sumatrapdfreader | sumatrapdf | 2.1.1 | |
artifex | mupdf | 1.0 | |
artifex | mupdf | 1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7423C1A3-5DC3-49BE-85BB-C55D2B058456", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:artifex:mupdf:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "33369840-03D2-4EA4-9D73-B63431E4D7FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:artifex:mupdf:1.1:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "C1F34AD9-8596-4C75-AFC7-F1F524627811", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file." }, { "lang": "es", "value": "SumatraPDF versi\u00f3n 2.1.1 y MuPDF versi\u00f3n 1.0, permite a atacantes remotos causar un desbordamiento de enteros en la funci\u00f3n lex_number() por medio de un archivo PDF corrupto." } ], "id": "CVE-2012-5340", "lastModified": "2024-11-21T01:44:32.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-23T22:15:09.683", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.exploit-db.com/exploits/23246" }, { "source": "cve@mitre.org", "url": "https://bugs.ghostscript.com/show_bug.cgi?id=693371" }, { "source": "cve@mitre.org", "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=f919270b6a732ff45c3ba2d0c105e2b39e9c9bc9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.exploit-db.com/exploits/23246" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-08 23:29
Modified
2024-11-21 01:52
Severity ?
Summary
Use-after-free vulnerability in SumatraPDF Reader 2.x before 2.2.1 allows remote attackers to execute arbitrary code via a crafted PDF file.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-005 | Patch, Third Party Advisory, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-005 | Patch, Third Party Advisory, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sumatrapdfreader | sumatrapdf | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F8B8A60-7127-4944-B827-D8B35129A852", "versionEndExcluding": "2.2.1", "versionStartIncluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in SumatraPDF Reader 2.x before 2.2.1 allows remote attackers to execute arbitrary code via a crafted PDF file." }, { "lang": "es", "value": "Vulnerabilidad de uso de memoria previamente liberada en las versiones 2.x de SumatraPDF Reader anteriores a la 2.2.1 permiten que atacantes remotos ejecuten c\u00f3digo arbitrario mediante un archivo PDF manipulado." } ], "id": "CVE-2013-2830", "lastModified": "2024-11-21T01:52:27.430", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-08T23:29:00.640", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-005" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-005" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-05 10:51
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4895.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sumatrapdfreader | sumatrapdf | * | |
sumatrapdfreader | sumatrapdf | 0.1 | |
sumatrapdfreader | sumatrapdf | 0.2 | |
sumatrapdfreader | sumatrapdf | 0.3 | |
sumatrapdfreader | sumatrapdf | 0.4 | |
sumatrapdfreader | sumatrapdf | 0.5 | |
sumatrapdfreader | sumatrapdf | 0.6 | |
sumatrapdfreader | sumatrapdf | 0.7 | |
sumatrapdfreader | sumatrapdf | 0.8 | |
sumatrapdfreader | sumatrapdf | 0.8.1 | |
sumatrapdfreader | sumatrapdf | 0.9 | |
sumatrapdfreader | sumatrapdf | 0.9.1 | |
sumatrapdfreader | sumatrapdf | 0.9.2 | |
sumatrapdfreader | sumatrapdf | 0.9.3 | |
sumatrapdfreader | sumatrapdf | 0.9.4 | |
sumatrapdfreader | sumatrapdf | 1.0 | |
sumatrapdfreader | sumatrapdf | 1.0.1 | |
sumatrapdfreader | sumatrapdf | 1.1 | |
sumatrapdfreader | sumatrapdf | 1.2 | |
sumatrapdfreader | sumatrapdf | 1.3 | |
sumatrapdfreader | sumatrapdf | 1.4 | |
sumatrapdfreader | sumatrapdf | 1.5 | |
sumatrapdfreader | sumatrapdf | 1.5.1 | |
sumatrapdfreader | sumatrapdf | 1.6 | |
sumatrapdfreader | sumatrapdf | 1.7 | |
sumatrapdfreader | sumatrapdf | 1.8 | |
sumatrapdfreader | sumatrapdf | 1.9 | |
sumatrapdfreader | sumatrapdf | 2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:*:*:*:*:*:*:*:*", "matchCriteriaId": "299C459F-4883-43D1-ADC2-2ABF4EFFC3EF", "versionEndIncluding": "2.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3BE8A6DE-5EB6-47C5-BBCA-5ED94783414D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7E763B24-5035-476D-8244-D876707FE4B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "678C49B5-A9F0-4A5C-8CDC-E85E5E509959", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "084084EE-CD7D-4D26-9F92-D6C1363C1127", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "968776E8-58DE-4D07-B81F-69D751E78569", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "22988B78-E426-4885-8B1A-55CD875325BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "8AB75661-4385-4C96-ADA6-5E57DF401CBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3BE3A563-DC97-4B03-939F-E183C612BBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA284413-F016-4604-BFBA-8C26BED5AD75", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4EB1D911-1EA5-4231-8B2C-97B4346B865A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "1640649C-D190-4FB5-BDC5-9A5B89945A18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "568130AC-C49F-4C09-9336-C8E3F454C675", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "76E67580-96C8-4164-88F8-DDA65F901290", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "BBC040EB-4221-4B42-B7F1-426E454BE523", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B3A05EB-7BA4-4D32-98E7-EC79CAAC3217", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3EBD432D-01A8-4680-A553-777EC277B992", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8959B7F1-C650-4B83-88C0-1C31CAEF88FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DA6C438D-F32D-49AB-9493-80CC602AAB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AFD3EFF-6141-41C9-BB7D-0D11282E3FBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "AA495E2F-FD32-4868-9CC2-5880E1BE0AC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "BEE15BF5-8776-45D1-A9B5-8C680238F107", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "33DB6436-B488-4C61-892A-172075B4C87E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "20D9D791-339F-42B7-9A50-77813F169865", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "74ACF178-B699-4354-8C37-87E5DF9F1686", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "F621DA97-0D9C-4316-AA50-82879F571971", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "32AE7E0E-09A4-40D8-896F-27CDD34C964E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "98ADA8F1-A080-4558-81CA-D9D3241E1327", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4895." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en SumatraPDF antes de v2.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un documento PDF modificado, una vulnerabilidad diferente a CVE-2012-4895." } ], "id": "CVE-2012-4896", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-10-05T10:51:16.130", "references": [ { "source": "cve@mitre.org", "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/50656" }, { "source": "cve@mitre.org", "url": "http://technet.microsoft.com/security/msvr/msvr12-014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://technet.microsoft.com/security/msvr/msvr12-014" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-05-11 20:00
Modified
2025-04-09 00:30
Severity ?
Summary
Heap-based buffer overflow in the loadexponentialfunc function in mupdf/pdf_function.c in MuPDF in the mupdf-20090223-win32 package, as used in SumatraPDF 0.9.3 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF file. NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sumatrapdfreader | sumatrapdf | * | |
sumatrapdfreader | sumatrapdf | 0.1 | |
sumatrapdfreader | sumatrapdf | 0.2 | |
sumatrapdfreader | sumatrapdf | 0.3 | |
sumatrapdfreader | sumatrapdf | 0.4 | |
sumatrapdfreader | sumatrapdf | 0.5 | |
sumatrapdfreader | sumatrapdf | 0.6 | |
sumatrapdfreader | sumatrapdf | 0.7 | |
sumatrapdfreader | sumatrapdf | 0.8 | |
sumatrapdfreader | sumatrapdf | 0.8.1 | |
sumatrapdfreader | sumatrapdf | 0.9 | |
sumatrapdfreader | sumatrapdf | 0.9.1 | |
sumatrapdfreader | sumatrapdf | 0.9.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:*:*:*:*:*:*:*:*", "matchCriteriaId": "71864658-0498-4E97-A1F4-47AC4E2835B0", "versionEndIncluding": "0.9.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3BE8A6DE-5EB6-47C5-BBCA-5ED94783414D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7E763B24-5035-476D-8244-D876707FE4B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "678C49B5-A9F0-4A5C-8CDC-E85E5E509959", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "084084EE-CD7D-4D26-9F92-D6C1363C1127", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "968776E8-58DE-4D07-B81F-69D751E78569", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "22988B78-E426-4885-8B1A-55CD875325BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "8AB75661-4385-4C96-ADA6-5E57DF401CBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3BE3A563-DC97-4B03-939F-E183C612BBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA284413-F016-4604-BFBA-8C26BED5AD75", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4EB1D911-1EA5-4231-8B2C-97B4346B865A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "1640649C-D190-4FB5-BDC5-9A5B89945A18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "568130AC-C49F-4C09-9336-C8E3F454C675", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the loadexponentialfunc function in mupdf/pdf_function.c in MuPDF in the mupdf-20090223-win32 package, as used in SumatraPDF 0.9.3 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF file. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en mont\u00edculo en la funci\u00f3n loadexponentialfunc en mupdf/pdf_function.c de MuPDF en el paquete mupdf-20090223-win32. Cuando se utilizada en SumatraPDF v0.9.3 y versiones anteriores, permite a usuarios remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un fichero PDF modificado maliciosamente. NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceras partes." } ], "id": "CVE-2009-1605", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2009-05-11T20:00:00.250", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0258.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34916" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1185" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1186" }, { "source": "cve@mitre.org", "url": "https://bugs.ghostscript.com/show_bug.cgi?id=690555" }, { "source": "cve@mitre.org", "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=451373e028f82fa2f1cc2a6a669df31d85c877bd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0258.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1185" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1186" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2012-4895 (GCVE-0-2012-4895)
Vulnerability from cvelistv5
Published
2012-10-05 10:00
Modified
2024-08-06 20:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4896.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:50:17.817Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "50656", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50656" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://technet.microsoft.com/security/msvr/msvr12-014" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4896." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-11T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "50656", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50656" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://technet.microsoft.com/security/msvr/msvr12-014" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-4895", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4896." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "50656", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/50656" }, { "name": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt", "refsource": "CONFIRM", "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt" }, { "name": "http://technet.microsoft.com/security/msvr/msvr12-014", "refsource": "MISC", "url": "http://technet.microsoft.com/security/msvr/msvr12-014" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-4895", "datePublished": "2012-10-05T10:00:00", "dateReserved": "2012-09-12T00:00:00", "dateUpdated": "2024-08-06T20:50:17.817Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2830 (GCVE-0-2013-2830)
Vulnerability from cvelistv5
Published
2018-02-08 23:00
Modified
2024-08-06 15:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Use-after-free vulnerability in SumatraPDF Reader 2.x before 2.2.1 allows remote attackers to execute arbitrary code via a crafted PDF file.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:52:20.497Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-005" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in SumatraPDF Reader 2.x before 2.2.1 allows remote attackers to execute arbitrary code via a crafted PDF file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-08T22:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-005" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-2830", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in SumatraPDF Reader 2.x before 2.2.1 allows remote attackers to execute arbitrary code via a crafted PDF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-005", "refsource": "MISC", "url": "https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-005" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-2830", "datePublished": "2018-02-08T23:00:00", "dateReserved": "2013-04-11T00:00:00", "dateUpdated": "2024-08-06T15:52:20.497Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-5340 (GCVE-0-2012-5340)
Vulnerability from cvelistv5
Published
2020-01-23 21:33
Modified
2024-09-13 16:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:05:47.259Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "23246", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/23246" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2012-5340", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-13T16:02:31.781858Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-13T16:02:54.702Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-12-09T00:00:00", "descriptions": [ { "lang": "en", "value": "SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T18:00:52.840474", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "23246", "tags": [ "exploit" ], "url": "http://www.exploit-db.com/exploits/23246" }, { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=693371" }, { "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=f919270b6a732ff45c3ba2d0c105e2b39e9c9bc9" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-5340", "datePublished": "2020-01-23T21:33:52", "dateReserved": "2012-10-08T00:00:00", "dateUpdated": "2024-09-13T16:02:54.702Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-4117 (GCVE-0-2009-4117)
Vulnerability from cvelistv5
Published
2009-12-01 00:00
Modified
2024-09-16 15:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple stack-based buffer overflows in pdf_shade4.c in MuPDF before commit 20091125231942, as used in SumatraPDF before 1.0.1, allow remote attackers to cause a denial of service and possibly execute arbitrary code via a /Decode array for certain types of shading that are not properly handled by the (1) pdf_loadtype4shade, (2) pdf_loadtype5shade, (3) pdf_loadtype6shade, and (4) pdf_loadtype7shade functions. NOTE: some of these details are obtained from third party information.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:54:09.610Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37494", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37494" }, { "name": "mupdf-pdfshade4c-bo(54441)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54441" }, { "name": "37513", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37513" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.kowalczyk.info/software/sumatrapdf/news.html" }, { "name": "20091128 MuPDF pdf_shade4.c multiple stack-based buffer overflows", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0330.html" }, { "name": "ADV-2009-3355", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3355" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in pdf_shade4.c in MuPDF before commit 20091125231942, as used in SumatraPDF before 1.0.1, allow remote attackers to cause a denial of service and possibly execute arbitrary code via a /Decode array for certain types of shading that are not properly handled by the (1) pdf_loadtype4shade, (2) pdf_loadtype5shade, (3) pdf_loadtype6shade, and (4) pdf_loadtype7shade functions. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-16T15:36:47.464527", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "37494", "tags": [ "third-party-advisory" ], "url": "http://secunia.com/advisories/37494" }, { "name": "mupdf-pdfshade4c-bo(54441)", "tags": [ "vdb-entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54441" }, { "name": "37513", "tags": [ "third-party-advisory" ], "url": "http://secunia.com/advisories/37513" }, { "url": "http://blog.kowalczyk.info/software/sumatrapdf/news.html" }, { "name": "20091128 MuPDF pdf_shade4.c multiple stack-based buffer overflows", "tags": [ "mailing-list" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0330.html" }, { "name": "ADV-2009-3355", "tags": [ "vdb-entry" ], "url": "http://www.vupen.com/english/advisories/2009/3355" }, { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=708030" }, { "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=a21cc1548993c392e474817bb3d656eb3730d88f" }, { "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=cf6860c3d70a2f7a63cdb621cc3b58c891915deb" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-4117", "datePublished": "2009-12-01T00:00:00", "dateReserved": "2009-11-30T00:00:00", "dateUpdated": "2024-09-16T15:36:47.464527", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-1605 (GCVE-0-2009-1605)
Vulnerability from cvelistv5
Published
2009-05-11 19:28
Modified
2024-09-16 20:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in the loadexponentialfunc function in mupdf/pdf_function.c in MuPDF in the mupdf-20090223-win32 package, as used in SumatraPDF 0.9.3 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF file. NOTE: some of these details are obtained from third party information.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:20:34.259Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34916", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34916" }, { "name": "ADV-2009-1185", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1185" }, { "name": "ADV-2009-1186", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1186" }, { "name": "20090424 SumatraPDF \u003c= 0.9.3 Heap Overflow PoC", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0258.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2009-1605", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-13T16:05:51.956930Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-13T16:06:48.066Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-04-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the loadexponentialfunc function in mupdf/pdf_function.c in MuPDF in the mupdf-20090223-win32 package, as used in SumatraPDF 0.9.3 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF file. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T17:54:22.364272", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34916", "tags": [ "third-party-advisory" ], "url": "http://secunia.com/advisories/34916" }, { "name": "ADV-2009-1185", "tags": [ "vdb-entry" ], "url": "http://www.vupen.com/english/advisories/2009/1185" }, { "name": "ADV-2009-1186", "tags": [ "vdb-entry" ], "url": "http://www.vupen.com/english/advisories/2009/1186" }, { "name": "20090424 SumatraPDF \u003c= 0.9.3 Heap Overflow PoC", "tags": [ "mailing-list" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0258.html" }, { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=690555" }, { "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=451373e028f82fa2f1cc2a6a669df31d85c877bd" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1605", "datePublished": "2009-05-11T19:28:00Z", "dateReserved": "2009-05-11T00:00:00Z", "dateUpdated": "2024-09-16T20:38:04.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-33802 (GCVE-0-2023-33802)
Vulnerability from cvelistv5
Published
2023-07-26 00:00
Modified
2024-10-23 15:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A buffer overflow in SumatraPDF Reader v3.4.6 allows attackers to cause a Denial of Service (DoS) via a crafted text file.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:54:12.504Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/CDACesec/CVE-2023-33802" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-33802", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T15:01:09.334612Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-23T15:01:33.962Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A buffer overflow in SumatraPDF Reader v3.4.6 allows attackers to cause a Denial of Service (DoS) via a crafted text file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-26T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/CDACesec/CVE-2023-33802" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-33802", "datePublished": "2023-07-26T00:00:00", "dateReserved": "2023-05-22T00:00:00", "dateUpdated": "2024-10-23T15:01:33.962Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4896 (GCVE-0-2012-4896)
Vulnerability from cvelistv5
Published
2012-10-05 10:00
Modified
2024-08-06 20:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4895.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:50:17.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "50656", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50656" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://technet.microsoft.com/security/msvr/msvr12-014" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4895." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-11T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "50656", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50656" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://technet.microsoft.com/security/msvr/msvr12-014" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-4896", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4895." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "50656", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/50656" }, { "name": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt", "refsource": "CONFIRM", "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt" }, { "name": "http://technet.microsoft.com/security/msvr/msvr12-014", "refsource": "MISC", "url": "http://technet.microsoft.com/security/msvr/msvr12-014" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-4896", "datePublished": "2012-10-05T10:00:00", "dateReserved": "2012-09-12T00:00:00", "dateUpdated": "2024-08-06T20:50:17.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }