pdfio 中存在无法达到退出条件的循环(“无限循环”)(CVE-2024-42358)

admin 2024-08-10 12:52:36 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
pdfio 中存在无法达到退出条件的循环(“无限循环”)(CVE-2024-42358)

CVE编号

CVE-2024-42358

利用情况

暂无

补丁情况

N/A

披露时间

2024-08-07
漏洞描述
PDFio is a simple C library for reading and writing PDF files. There is a denial of service (DOS) vulnerability in the TTF parser. Maliciously crafted TTF files can cause the program to utilize 100% of the Memory and enter an infinite loop. This can also lead to a heap-buffer-overflow vulnerability. An infinite loop occurs in the read_camp function by nGroups value. The ttf.h library is vulnerable. A value called nGroups is extracted from the file, and by changing that value, you can cause the program to utilize 100% of the Memory and enter an infinite loop. If the value of nGroups in the file is small, an infinite loop will not occur. This library, whether used as a standalone binary or as part of another application, is vulnerable to DOS attacks when parsing certain types of files. Automated systems, including web servers that use this code to convert PDF submissions into plaintext, can be DOSed if an attacker uploads a malicious TTF file. This issue has been addressed in release version 1.3.1. All users are advised to upgrade. There are no known workarounds for this vulnerability.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/michaelrsweet/pdfio/commit/e4e1c39578279386b0ab9f9ac14b20a...
https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-4hh9-j68x-8353
CVSS3评分 N/A
  • 攻击路径 N/A
  • 攻击复杂度 N/A
  • 权限要求 N/A
  • 影响范围 N/A
  • 用户交互 N/A
  • 可用性 N/A
  • 保密性 N/A
  • 完整性 N/A
N/A
CWE-ID 漏洞类型
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0