Use After Free Affecting mupdf package, versions [,1.12.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.13% (49th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use After Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-MUPDF-2367867
  • published26 Jan 2022
  • disclosed16 Oct 2017
  • creditUnknown

Introduced: 16 Oct 2017

CVE-2017-15369  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

Upgrade mupdf to version 1.12.0 or higher.

Overview

Affected versions of this package are vulnerable to Use After Free. The build_filter_chain function in pdf/pdf-stream.c in Artifex MuPDF before 2017-09-25 mishandles a certain case where a variable may reside in a register, which allows remote attackers to cause a denial of service (Fitz fz_drop_imp use-after-free and application crash) or possibly have unspecified other impact via a crafted PDF document.

CVSS Scores

version 3.1