Vulnerabilites related to sumatrapdfreader - sumatrapdf
Vulnerability from fkie_nvd
Published
2018-02-08 23:29
Modified
2024-11-21 01:52
Summary
Use-after-free vulnerability in SumatraPDF Reader 2.x before 2.2.1 allows remote attackers to execute arbitrary code via a crafted PDF file.
Impacted products
Vendor Product Version
sumatrapdfreader sumatrapdf *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F8B8A60-7127-4944-B827-D8B35129A852",
              "versionEndExcluding": "2.2.1",
              "versionStartIncluding": "2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Use-after-free vulnerability in SumatraPDF Reader 2.x before 2.2.1 allows remote attackers to execute arbitrary code via a crafted PDF file."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de uso de memoria previamente liberada en las versiones 2.x de SumatraPDF Reader anteriores a la 2.2.1 permiten que atacantes remotos ejecuten c\u00f3digo arbitrario mediante un archivo PDF manipulado."
    }
  ],
  "id": "CVE-2013-2830",
  "lastModified": "2024-11-21T01:52:27.430",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-02-08T23:29:00.640",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "Vendor Advisory"
      ],
      "url": "https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "Vendor Advisory"
      ],
      "url": "https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-005"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-26 20:15
Modified
2024-11-21 08:06
Summary
A buffer overflow in SumatraPDF Reader v3.4.6 allows attackers to cause a Denial of Service (DoS) via a crafted text file.
Impacted products
Vendor Product Version
sumatrapdfreader sumatrapdf 3.4.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E57C2A0-4153-4F8A-8FFD-0839E14C4743",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A buffer overflow in SumatraPDF Reader v3.4.6 allows attackers to cause a Denial of Service (DoS) via a crafted text file."
    }
  ],
  "id": "CVE-2023-33802",
  "lastModified": "2024-11-21T08:06:02.003",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-26T20:15:12.613",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/CDACesec/CVE-2023-33802"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/CDACesec/CVE-2023-33802"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-01-23 22:15
Modified
2024-11-21 01:44
Summary
SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file.
Impacted products
Vendor Product Version
sumatrapdfreader sumatrapdf 2.1.1
artifex mupdf 1.0
artifex mupdf 1.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7423C1A3-5DC3-49BE-85BB-C55D2B058456",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:artifex:mupdf:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33369840-03D2-4EA4-9D73-B63431E4D7FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:artifex:mupdf:1.1:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "C1F34AD9-8596-4C75-AFC7-F1F524627811",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file."
    },
    {
      "lang": "es",
      "value": "SumatraPDF versi\u00f3n 2.1.1 y MuPDF versi\u00f3n 1.0, permite a atacantes remotos causar un desbordamiento de enteros en la funci\u00f3n lex_number() por medio de un archivo PDF corrupto."
    }
  ],
  "id": "CVE-2012-5340",
  "lastModified": "2024-11-21T01:44:32.650",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-23T22:15:09.683",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.exploit-db.com/exploits/23246"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugs.ghostscript.com/show_bug.cgi?id=693371"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=f919270b6a732ff45c3ba2d0c105e2b39e9c9bc9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.exploit-db.com/exploits/23246"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-10-05 10:51
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4895.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "299C459F-4883-43D1-ADC2-2ABF4EFFC3EF",
              "versionEndIncluding": "2.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE8A6DE-5EB6-47C5-BBCA-5ED94783414D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E763B24-5035-476D-8244-D876707FE4B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C49B5-A9F0-4A5C-8CDC-E85E5E509959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "084084EE-CD7D-4D26-9F92-D6C1363C1127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "968776E8-58DE-4D07-B81F-69D751E78569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22988B78-E426-4885-8B1A-55CD875325BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AB75661-4385-4C96-ADA6-5E57DF401CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE3A563-DC97-4B03-939F-E183C612BBD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA284413-F016-4604-BFBA-8C26BED5AD75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EB1D911-1EA5-4231-8B2C-97B4346B865A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1640649C-D190-4FB5-BDC5-9A5B89945A18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "568130AC-C49F-4C09-9336-C8E3F454C675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "76E67580-96C8-4164-88F8-DDA65F901290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBC040EB-4221-4B42-B7F1-426E454BE523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3A05EB-7BA4-4D32-98E7-EC79CAAC3217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EBD432D-01A8-4680-A553-777EC277B992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8959B7F1-C650-4B83-88C0-1C31CAEF88FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6C438D-F32D-49AB-9493-80CC602AAB57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AFD3EFF-6141-41C9-BB7D-0D11282E3FBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA495E2F-FD32-4868-9CC2-5880E1BE0AC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEE15BF5-8776-45D1-A9B5-8C680238F107",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DB6436-B488-4C61-892A-172075B4C87E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D9D791-339F-42B7-9A50-77813F169865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "74ACF178-B699-4354-8C37-87E5DF9F1686",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F621DA97-0D9C-4316-AA50-82879F571971",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AE7E0E-09A4-40D8-896F-27CDD34C964E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "98ADA8F1-A080-4558-81CA-D9D3241E1327",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4895."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en SumatraPDF antes de v2.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un documento PDF modificado, una vulnerabilidad diferente a CVE-2012-4895."
    }
  ],
  "id": "CVE-2012-4896",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-10-05T10:51:16.130",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/50656"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://technet.microsoft.com/security/msvr/msvr12-014"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50656"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://technet.microsoft.com/security/msvr/msvr12-014"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-09-15 16:15
Modified
2025-09-20 02:48
Summary
A null pointer dereference vulnerability was discovered in SumatraPDF 3.5.2 during the processing of a crafted .djvu file. When the file is opened, the application crashes inside libmupdf.dll, specifically in the DataPool::has_data() function.
References
Impacted products
Vendor Product Version
sumatrapdfreader sumatrapdf 3.5.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F0407F6-E066-4F5B-A263-5B77849A9A6E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A null pointer dereference vulnerability was discovered in SumatraPDF 3.5.2 during the processing of a crafted .djvu file. When the file is opened, the application crashes inside libmupdf.dll, specifically in the DataPool::has_data() function."
    }
  ],
  "id": "CVE-2025-57248",
  "lastModified": "2025-09-20T02:48:48.503",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-09-15T16:15:39.423",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://github.com/sumatrapdfreader/sumatrapdf/issues/5035"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-05-11 20:00
Modified
2025-04-09 00:30
Summary
Heap-based buffer overflow in the loadexponentialfunc function in mupdf/pdf_function.c in MuPDF in the mupdf-20090223-win32 package, as used in SumatraPDF 0.9.3 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF file. NOTE: some of these details are obtained from third party information.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "71864658-0498-4E97-A1F4-47AC4E2835B0",
              "versionEndIncluding": "0.9.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE8A6DE-5EB6-47C5-BBCA-5ED94783414D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E763B24-5035-476D-8244-D876707FE4B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C49B5-A9F0-4A5C-8CDC-E85E5E509959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "084084EE-CD7D-4D26-9F92-D6C1363C1127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "968776E8-58DE-4D07-B81F-69D751E78569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22988B78-E426-4885-8B1A-55CD875325BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AB75661-4385-4C96-ADA6-5E57DF401CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE3A563-DC97-4B03-939F-E183C612BBD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA284413-F016-4604-BFBA-8C26BED5AD75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EB1D911-1EA5-4231-8B2C-97B4346B865A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1640649C-D190-4FB5-BDC5-9A5B89945A18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "568130AC-C49F-4C09-9336-C8E3F454C675",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in the loadexponentialfunc function in mupdf/pdf_function.c in MuPDF in the mupdf-20090223-win32 package, as used in SumatraPDF 0.9.3 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF file.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en mont\u00edculo en la funci\u00f3n loadexponentialfunc en mupdf/pdf_function.c de MuPDF en el paquete mupdf-20090223-win32. Cuando se utilizada en SumatraPDF v0.9.3 y versiones anteriores, permite a usuarios remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un fichero PDF modificado maliciosamente. NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceras partes."
    }
  ],
  "id": "CVE-2009-1605",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2009-05-11T20:00:00.250",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0258.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34916"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1185"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1186"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugs.ghostscript.com/show_bug.cgi?id=690555"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=451373e028f82fa2f1cc2a6a669df31d85c877bd"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0258.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34916"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1186"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-12-01 00:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple stack-based buffer overflows in pdf_shade4.c in MuPDF before commit 20091125231942, as used in SumatraPDF before 1.0.1, allow remote attackers to cause a denial of service and possibly execute arbitrary code via a /Decode array for certain types of shading that are not properly handled by the (1) pdf_loadtype4shade, (2) pdf_loadtype5shade, (3) pdf_loadtype6shade, and (4) pdf_loadtype7shade functions. NOTE: some of these details are obtained from third party information.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9B4E19-8BAA-4EC8-9E37-56CEE745DEF0",
              "versionEndIncluding": "1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE8A6DE-5EB6-47C5-BBCA-5ED94783414D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E763B24-5035-476D-8244-D876707FE4B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C49B5-A9F0-4A5C-8CDC-E85E5E509959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "084084EE-CD7D-4D26-9F92-D6C1363C1127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "968776E8-58DE-4D07-B81F-69D751E78569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22988B78-E426-4885-8B1A-55CD875325BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AB75661-4385-4C96-ADA6-5E57DF401CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE3A563-DC97-4B03-939F-E183C612BBD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA284413-F016-4604-BFBA-8C26BED5AD75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EB1D911-1EA5-4231-8B2C-97B4346B865A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1640649C-D190-4FB5-BDC5-9A5B89945A18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "568130AC-C49F-4C09-9336-C8E3F454C675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "76E67580-96C8-4164-88F8-DDA65F901290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBC040EB-4221-4B42-B7F1-426E454BE523",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stack-based buffer overflows in pdf_shade4.c in MuPDF before commit 20091125231942, as used in SumatraPDF before 1.0.1, allow remote attackers to cause a denial of service and possibly execute arbitrary code via a /Decode array for certain types of shading that are not properly handled by the (1) pdf_loadtype4shade, (2) pdf_loadtype5shade, (3) pdf_loadtype6shade, and (4) pdf_loadtype7shade functions.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "Multiples desbordamientos de b\u00fafer basados en pila en pdf_shade4.c de MuPDF en versiones anteriores a commit 20091125231942, y como es utilizado en SumatraPDF en versiones anteriores a la v1.0.1, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un array /Decode para ciertos tipos de sombreado que no son apropiadamente manejados por las funciones (1) pdf_loadtype4shade, (2) pdf_loadtype5shade, (3) pdf_loadtype6shade, y (4) pdf_loadtype7shade.  NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceras partes."
    }
  ],
  "id": "CVE-2009-4117",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-12-01T00:30:00.217",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0330.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://blog.kowalczyk.info/software/sumatrapdf/news.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37494"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37513"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3355"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugs.ghostscript.com/show_bug.cgi?id=708030"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=a21cc1548993c392e474817bb3d656eb3730d88f"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=cf6860c3d70a2f7a63cdb621cc3b58c891915deb"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54441"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0330.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://blog.kowalczyk.info/software/sumatrapdf/news.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37494"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37513"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54441"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-10-05 10:51
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4896.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "299C459F-4883-43D1-ADC2-2ABF4EFFC3EF",
              "versionEndIncluding": "2.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE8A6DE-5EB6-47C5-BBCA-5ED94783414D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E763B24-5035-476D-8244-D876707FE4B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C49B5-A9F0-4A5C-8CDC-E85E5E509959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "084084EE-CD7D-4D26-9F92-D6C1363C1127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "968776E8-58DE-4D07-B81F-69D751E78569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22988B78-E426-4885-8B1A-55CD875325BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AB75661-4385-4C96-ADA6-5E57DF401CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE3A563-DC97-4B03-939F-E183C612BBD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA284413-F016-4604-BFBA-8C26BED5AD75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EB1D911-1EA5-4231-8B2C-97B4346B865A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1640649C-D190-4FB5-BDC5-9A5B89945A18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "568130AC-C49F-4C09-9336-C8E3F454C675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "76E67580-96C8-4164-88F8-DDA65F901290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBC040EB-4221-4B42-B7F1-426E454BE523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3A05EB-7BA4-4D32-98E7-EC79CAAC3217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EBD432D-01A8-4680-A553-777EC277B992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8959B7F1-C650-4B83-88C0-1C31CAEF88FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6C438D-F32D-49AB-9493-80CC602AAB57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AFD3EFF-6141-41C9-BB7D-0D11282E3FBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA495E2F-FD32-4868-9CC2-5880E1BE0AC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEE15BF5-8776-45D1-A9B5-8C680238F107",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DB6436-B488-4C61-892A-172075B4C87E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D9D791-339F-42B7-9A50-77813F169865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "74ACF178-B699-4354-8C37-87E5DF9F1686",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F621DA97-0D9C-4316-AA50-82879F571971",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AE7E0E-09A4-40D8-896F-27CDD34C964E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sumatrapdfreader:sumatrapdf:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "98ADA8F1-A080-4558-81CA-D9D3241E1327",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4896."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en SumatraPDF antes de v2.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un documento PDF modificado, una vulnerabilidad diferente a CVE-2012-4896."
    }
  ],
  "id": "CVE-2012-4895",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-10-05T10:51:16.083",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/50656"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://technet.microsoft.com/security/msvr/msvr12-014"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50656"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://technet.microsoft.com/security/msvr/msvr12-014"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2009-1605 (GCVE-0-2009-1605)
Vulnerability from cvelistv5
Published
2009-05-11 19:28
Modified
2024-09-16 20:38
CWE
  • n/a
Summary
Heap-based buffer overflow in the loadexponentialfunc function in mupdf/pdf_function.c in MuPDF in the mupdf-20090223-win32 package, as used in SumatraPDF 0.9.3 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF file. NOTE: some of these details are obtained from third party information.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:20:34.259Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "34916",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34916"
          },
          {
            "name": "ADV-2009-1185",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1185"
          },
          {
            "name": "ADV-2009-1186",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1186"
          },
          {
            "name": "20090424 SumatraPDF \u003c= 0.9.3 Heap Overflow PoC",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0258.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 5.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2009-1605",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-13T16:05:51.956930Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-13T16:06:48.066Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the loadexponentialfunc function in mupdf/pdf_function.c in MuPDF in the mupdf-20090223-win32 package, as used in SumatraPDF 0.9.3 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF file.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-12T17:54:22.364272",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "34916",
          "tags": [
            "third-party-advisory"
          ],
          "url": "http://secunia.com/advisories/34916"
        },
        {
          "name": "ADV-2009-1185",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1185"
        },
        {
          "name": "ADV-2009-1186",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1186"
        },
        {
          "name": "20090424 SumatraPDF \u003c= 0.9.3 Heap Overflow PoC",
          "tags": [
            "mailing-list"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0258.html"
        },
        {
          "url": "https://bugs.ghostscript.com/show_bug.cgi?id=690555"
        },
        {
          "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=451373e028f82fa2f1cc2a6a669df31d85c877bd"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1605",
    "datePublished": "2009-05-11T19:28:00Z",
    "dateReserved": "2009-05-11T00:00:00Z",
    "dateUpdated": "2024-09-16T20:38:04.258Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-4896 (GCVE-0-2012-4896)
Vulnerability from cvelistv5
Published
2012-10-05 10:00
Modified
2024-08-06 20:50
Severity ?
CWE
  • n/a
Summary
Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4895.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:50:17.690Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "50656",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50656"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://technet.microsoft.com/security/msvr/msvr12-014"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4895."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-04-11T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "50656",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50656"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://technet.microsoft.com/security/msvr/msvr12-014"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-4896",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4895."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "50656",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50656"
            },
            {
              "name": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt"
            },
            {
              "name": "http://technet.microsoft.com/security/msvr/msvr12-014",
              "refsource": "MISC",
              "url": "http://technet.microsoft.com/security/msvr/msvr12-014"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-4896",
    "datePublished": "2012-10-05T10:00:00",
    "dateReserved": "2012-09-12T00:00:00",
    "dateUpdated": "2024-08-06T20:50:17.690Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4117 (GCVE-0-2009-4117)
Vulnerability from cvelistv5
Published
2009-12-01 00:00
Modified
2024-09-16 15:36
Severity ?
CWE
  • n/a
Summary
Multiple stack-based buffer overflows in pdf_shade4.c in MuPDF before commit 20091125231942, as used in SumatraPDF before 1.0.1, allow remote attackers to cause a denial of service and possibly execute arbitrary code via a /Decode array for certain types of shading that are not properly handled by the (1) pdf_loadtype4shade, (2) pdf_loadtype5shade, (3) pdf_loadtype6shade, and (4) pdf_loadtype7shade functions. NOTE: some of these details are obtained from third party information.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:54:09.610Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "37494",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37494"
          },
          {
            "name": "mupdf-pdfshade4c-bo(54441)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54441"
          },
          {
            "name": "37513",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37513"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://blog.kowalczyk.info/software/sumatrapdf/news.html"
          },
          {
            "name": "20091128 MuPDF pdf_shade4.c multiple stack-based buffer overflows",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0330.html"
          },
          {
            "name": "ADV-2009-3355",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3355"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-11-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in pdf_shade4.c in MuPDF before commit 20091125231942, as used in SumatraPDF before 1.0.1, allow remote attackers to cause a denial of service and possibly execute arbitrary code via a /Decode array for certain types of shading that are not properly handled by the (1) pdf_loadtype4shade, (2) pdf_loadtype5shade, (3) pdf_loadtype6shade, and (4) pdf_loadtype7shade functions.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-16T15:36:47.464527",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "37494",
          "tags": [
            "third-party-advisory"
          ],
          "url": "http://secunia.com/advisories/37494"
        },
        {
          "name": "mupdf-pdfshade4c-bo(54441)",
          "tags": [
            "vdb-entry"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54441"
        },
        {
          "name": "37513",
          "tags": [
            "third-party-advisory"
          ],
          "url": "http://secunia.com/advisories/37513"
        },
        {
          "url": "http://blog.kowalczyk.info/software/sumatrapdf/news.html"
        },
        {
          "name": "20091128 MuPDF pdf_shade4.c multiple stack-based buffer overflows",
          "tags": [
            "mailing-list"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0330.html"
        },
        {
          "name": "ADV-2009-3355",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3355"
        },
        {
          "url": "https://bugs.ghostscript.com/show_bug.cgi?id=708030"
        },
        {
          "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=a21cc1548993c392e474817bb3d656eb3730d88f"
        },
        {
          "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=cf6860c3d70a2f7a63cdb621cc3b58c891915deb"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4117",
    "datePublished": "2009-12-01T00:00:00",
    "dateReserved": "2009-11-30T00:00:00",
    "dateUpdated": "2024-09-16T15:36:47.464527",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-4895 (GCVE-0-2012-4895)
Vulnerability from cvelistv5
Published
2012-10-05 10:00
Modified
2024-08-06 20:50
Severity ?
CWE
  • n/a
Summary
Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4896.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:50:17.817Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "50656",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50656"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://technet.microsoft.com/security/msvr/msvr12-014"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4896."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-04-11T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "50656",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50656"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://technet.microsoft.com/security/msvr/msvr12-014"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-4895",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in SumatraPDF before 2.1 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2012-4896."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "50656",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50656"
            },
            {
              "name": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt"
            },
            {
              "name": "http://technet.microsoft.com/security/msvr/msvr12-014",
              "refsource": "MISC",
              "url": "http://technet.microsoft.com/security/msvr/msvr12-014"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-4895",
    "datePublished": "2012-10-05T10:00:00",
    "dateReserved": "2012-09-12T00:00:00",
    "dateUpdated": "2024-08-06T20:50:17.817Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-2830 (GCVE-0-2013-2830)
Vulnerability from cvelistv5
Published
2018-02-08 23:00
Modified
2024-08-06 15:52
Severity ?
CWE
  • n/a
Summary
Use-after-free vulnerability in SumatraPDF Reader 2.x before 2.2.1 allows remote attackers to execute arbitrary code via a crafted PDF file.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:52:20.497Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-005"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-04-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Use-after-free vulnerability in SumatraPDF Reader 2.x before 2.2.1 allows remote attackers to execute arbitrary code via a crafted PDF file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-08T22:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-005"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-2830",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Use-after-free vulnerability in SumatraPDF Reader 2.x before 2.2.1 allows remote attackers to execute arbitrary code via a crafted PDF file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-005",
              "refsource": "MISC",
              "url": "https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-005"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-2830",
    "datePublished": "2018-02-08T23:00:00",
    "dateReserved": "2013-04-11T00:00:00",
    "dateUpdated": "2024-08-06T15:52:20.497Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-5340 (GCVE-0-2012-5340)
Vulnerability from cvelistv5
Published
2020-01-23 21:33
Modified
2024-09-13 16:02
Severity ?
CWE
  • n/a
Summary
SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:05:47.259Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "23246",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/23246"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2012-5340",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-13T16:02:31.781858Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-13T16:02:54.702Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-12-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-12T18:00:52.840474",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "23246",
          "tags": [
            "exploit"
          ],
          "url": "http://www.exploit-db.com/exploits/23246"
        },
        {
          "url": "https://bugs.ghostscript.com/show_bug.cgi?id=693371"
        },
        {
          "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=f919270b6a732ff45c3ba2d0c105e2b39e9c9bc9"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-5340",
    "datePublished": "2020-01-23T21:33:52",
    "dateReserved": "2012-10-08T00:00:00",
    "dateUpdated": "2024-09-13T16:02:54.702Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-33802 (GCVE-0-2023-33802)
Vulnerability from cvelistv5
Published
2023-07-26 00:00
Modified
2024-10-23 15:01
Severity ?
CWE
  • n/a
Summary
A buffer overflow in SumatraPDF Reader v3.4.6 allows attackers to cause a Denial of Service (DoS) via a crafted text file.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:12.504Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/CDACesec/CVE-2023-33802"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33802",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-23T15:01:09.334612Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-23T15:01:33.962Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A buffer overflow in SumatraPDF Reader v3.4.6 allows attackers to cause a Denial of Service (DoS) via a crafted text file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-26T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/CDACesec/CVE-2023-33802"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-33802",
    "datePublished": "2023-07-26T00:00:00",
    "dateReserved": "2023-05-22T00:00:00",
    "dateUpdated": "2024-10-23T15:01:33.962Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-200905-0178
Vulnerability from variot

Heap-based buffer overflow in the loadexponentialfunc function in mupdf/pdf_function.c in MuPDF in the mupdf-20090223-win32 package, as used in SumatraPDF 0.9.3 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF file. NOTE: some of these details are obtained from third party information. MuPDF is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the application or crash the application, denying service to legitimate users. ----------------------------------------------------------------------

Secunia is pleased to announce the release of the annual Secunia report for 2008.

Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics

Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/

Stay Secure,

Secunia


TITLE: MuPDF "loadexponentialfunc()" Buffer Overflow Vulnerability

SECUNIA ADVISORY ID: SA34916

VERIFY ADVISORY: http://secunia.com/advisories/34916/

DESCRIPTION: c has discovered a vulnerability in MuPDF, which can be exploited by malicious people to potentially compromise an application using the library.

The vulnerability is caused due to a boundary error within the "loadexponentialfunc()" function in pdf_function.c.

Successful exploitation may allow execution of arbitrary code.

The vulnerability is confirmed in the MuPDF library included in the mupdf-20090223-win32 package. Other versions may also be affected.

SOLUTION: Do not process untrusted PDF files using the library.

PROVIDED AND/OR DISCOVERED BY: c

ORIGINAL ADVISORY: http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0258.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200905-0178",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.5"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.6"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.9"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.9.2"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.7"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.8.1"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.3"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.4"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.9.1"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.2"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.1"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.8"
      },
      {
        "model": "sumatrapdf",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "0.9.3"
      },
      {
        "model": "sumatrapdf",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "krzysztof kowalczyk",
        "version": "0.9.3"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.9"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.8.1"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.4"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.7"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.8"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.5"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.9.3"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.6"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.1"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "krzysztof kowalczyk",
        "version": "0.9.2"
      },
      {
        "model": "pdf sumatra pdf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sumatra",
        "version": "0.9.3"
      },
      {
        "model": "mupdf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mupdf",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "34746"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:krzysztof_kowalczyk:sumatrapdf",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "c c@c.cc)",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2009-1605",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2009-1605",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.8,
            "id": "CVE-2009-1605",
            "impactScore": 2.5,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-1605",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2009-1605",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2009-1605",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200905-123",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULMON",
            "id": "CVE-2009-1605",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Heap-based buffer overflow in the loadexponentialfunc function in mupdf/pdf_function.c in MuPDF in the mupdf-20090223-win32 package, as used in SumatraPDF 0.9.3 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF file.  NOTE: some of these details are obtained from third party information. MuPDF is prone to a remote code-execution vulnerability. \nAn attacker can exploit this issue to execute arbitrary code with the privileges of the user running the application or crash the application, denying service to legitimate users. ----------------------------------------------------------------------\n\nSecunia is pleased to announce the release of the annual Secunia\nreport for 2008. \n\nHighlights from the 2008 report:\n * Vulnerability Research\n * Software Inspection Results\n * Secunia Research Highlights\n * Secunia Advisory Statistics\n\nRequest the full 2008 Report here:\nhttp://secunia.com/advisories/try_vi/request_2008_report/\n\nStay Secure,\n\nSecunia\n\n\n----------------------------------------------------------------------\n\nTITLE:\nMuPDF \"loadexponentialfunc()\" Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA34916\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/34916/\n\nDESCRIPTION:\nc has discovered a vulnerability in MuPDF, which can be exploited by\nmalicious people to potentially compromise an application using the\nlibrary. \n\nThe vulnerability is caused due to a boundary error within the\n\"loadexponentialfunc()\" function in pdf_function.c. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\nThe vulnerability is confirmed in the MuPDF library included in the\nmupdf-20090223-win32 package. Other versions may also be affected. \n\nSOLUTION:\nDo not process untrusted PDF files using the library. \n\nPROVIDED AND/OR DISCOVERED BY:\nc\n\nORIGINAL ADVISORY:\nhttp://archives.neohapsis.com/archives/fulldisclosure/2009-04/0258.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "db": "BID",
        "id": "34746"
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "db": "PACKETSTORM",
        "id": "77098"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2009-1605",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "34916",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-1186",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-1185",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "34746",
        "trust": 0.4
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1605",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "77098",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "db": "BID",
        "id": "34746"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "db": "PACKETSTORM",
        "id": "77098"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "id": "VAR-200905-0178",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.16666667
  },
  "last_update_date": "2024-11-23T21:47:55.424000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://mupdf.com/"
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/0xCyberY/CVE-T4PDF "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0258.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2009/1186"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/34916"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2009/1185"
      },
      {
        "trust": 1.0,
        "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=451373e028f82fa2f1cc2a6a669df31d85c877bd"
      },
      {
        "trust": 1.0,
        "url": "https://bugs.ghostscript.com/show_bug.cgi?id=690555"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1605"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1605"
      },
      {
        "trust": 0.3,
        "url": "http://ccxvii.net/fitz/"
      },
      {
        "trust": 0.3,
        "url": "http://blog.kowalczyk.info/software/sumatrapdf/index.html"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/119.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.securityfocus.com/bid/34746"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/0xcybery/cve-t4pdf"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/try_vi/request_2008_report/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/34916/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "db": "BID",
        "id": "34746"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "db": "PACKETSTORM",
        "id": "77098"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "db": "BID",
        "id": "34746"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "db": "PACKETSTORM",
        "id": "77098"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-05-11T00:00:00",
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "date": "2009-04-24T00:00:00",
        "db": "BID",
        "id": "34746"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "date": "2009-04-29T10:20:18",
        "db": "PACKETSTORM",
        "id": "77098"
      },
      {
        "date": "2009-04-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      },
      {
        "date": "2009-05-11T20:00:00.250000",
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-11T00:00:00",
        "db": "VULMON",
        "id": "CVE-2009-1605"
      },
      {
        "date": "2009-05-21T05:20:00",
        "db": "BID",
        "id": "34746"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      },
      {
        "date": "2021-07-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      },
      {
        "date": "2024-11-21T01:02:53.313000",
        "db": "NVD",
        "id": "CVE-2009-1605"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SumatraPDF Heap-based buffer overflow vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004653"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-123"
      }
    ],
    "trust": 0.6
  }
}

var-202001-0062
Vulnerability from variot

SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file. SumatraPDF and MuPDF Contains an integer overflow vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Sumatra PDF and MuPDF are prone to an integer-overflow vulnerability because they fail to properly validate user-supplied input. An attacker can exploit this issue to execute arbitrary malicious code in the context of the affected application. Failed exploit attempts will likely crash the application. The following versions are vulnerable: MuPDF 1.0 MuPDF for iOS 1.1 Sumatra 2.1.1. ----------------------------------------------------------------------

The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/


TITLE: MuPDF "pdf_repair_obj_stm()" Signedness Vulnerability

SECUNIA ADVISORY ID: SA51544

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51544/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51544

RELEASE DATE: 2012-12-12

DISCUSS ADVISORY: http://secunia.com/advisories/51544/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/51544/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=51544

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A vulnerability has been discovered in MuPDF, which can be exploited by malicious people to potentially compromise a user's system.

The vulnerability is caused due to a signedness error in the "pdf_repair_obj_stm()" function (pdf/pdf_repair.c) when processing a stream and can be exploited to corrupt memory via a specially crafted length number.

Successful exploitation may allow execution of arbitrary code, but requires tricking a user into opening a malicious PDF document.

The vulnerability is confirmed in version 1.0. Prior versions may also be affected.

SOLUTION: Update to version 1.1.

PROVIDED AND/OR DISCOVERED BY: beford

ORIGINAL ADVISORY: beford: http://www.exploit-db.com/exploits/23246/

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0062",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mupdf",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "artifex",
        "version": "1.0"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sumatrapdfreader",
        "version": "2.1.1"
      },
      {
        "model": "mupdf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "artifex",
        "version": "1.1"
      },
      {
        "model": "sumatrapdf",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "krzysztof kowalczyk",
        "version": "2.1.1"
      },
      {
        "model": "pdf sumatra pdf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sumatra",
        "version": "2.1.1"
      },
      {
        "model": "for ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mupdf",
        "version": "1.1"
      },
      {
        "model": "mupdf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mupdf",
        "version": "1.0"
      },
      {
        "model": "mupdf",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "mupdf",
        "version": "1.1"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "56875"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006573"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-5340"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "beford",
    "sources": [
      {
        "db": "BID",
        "id": "56875"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-132"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2012-5340",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2012-5340",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2012-5340",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2012-5340",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-5340",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-5340",
            "trust": 0.8,
            "value": "High"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006573"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-5340"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file. SumatraPDF and MuPDF Contains an integer overflow vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Sumatra PDF and MuPDF are prone to an integer-overflow vulnerability because they fail to properly validate user-supplied input. \nAn attacker can exploit this issue to execute arbitrary malicious code in the context of the affected application. Failed exploit attempts will likely crash the application. \nThe following versions are vulnerable:\nMuPDF 1.0\nMuPDF for iOS 1.1\nSumatra 2.1.1. ----------------------------------------------------------------------\n\nThe final version of the CSI 6.0 has been released. \nFind out why this is not just another Patch Management solution: http://secunia.com/blog/325/\n\n----------------------------------------------------------------------\n\nTITLE:\nMuPDF \"pdf_repair_obj_stm()\" Signedness Vulnerability\n\nSECUNIA ADVISORY ID:\nSA51544\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/51544/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=51544\n\nRELEASE DATE:\n2012-12-12\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/51544/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/51544/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=51544\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been discovered in MuPDF, which can be exploited\nby malicious people to potentially compromise a user\u0027s system. \n\nThe vulnerability is caused due to a signedness error in the\n\"pdf_repair_obj_stm()\" function (pdf/pdf_repair.c) when processing a\nstream and can be exploited to corrupt memory via a specially crafted\nlength number. \n\nSuccessful exploitation may allow execution of arbitrary code, but\nrequires tricking a user into opening a malicious PDF document. \n\nThe vulnerability is confirmed in version 1.0. Prior versions may\nalso be affected. \n\nSOLUTION:\nUpdate to version 1.1. \n\nPROVIDED AND/OR DISCOVERED BY:\nbeford\n\nORIGINAL ADVISORY:\nbeford:\nhttp://www.exploit-db.com/exploits/23246/\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-5340"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006573"
      },
      {
        "db": "BID",
        "id": "56875"
      },
      {
        "db": "PACKETSTORM",
        "id": "118778"
      },
      {
        "db": "PACKETSTORM",
        "id": "118777"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-5340",
        "trust": 2.7
      },
      {
        "db": "EXPLOIT-DB",
        "id": "23246",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006573",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-132",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "56875",
        "trust": 0.3
      },
      {
        "db": "SECUNIA",
        "id": "51544",
        "trust": 0.2
      },
      {
        "db": "SECUNIA",
        "id": "51511",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "118778",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "118777",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "56875"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006573"
      },
      {
        "db": "PACKETSTORM",
        "id": "118778"
      },
      {
        "db": "PACKETSTORM",
        "id": "118777"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-132"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-5340"
      }
    ]
  },
  "id": "VAR-202001-0062",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.16666667
  },
  "last_update_date": "2024-09-13T23:17:49.693000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Artifex\u00a0Software Krzysztof\u00a0KowalczykSumatra\u00a0PDF",
        "trust": 0.8,
        "url": "https://artifex.com/products-mupdf-overview/"
      },
      {
        "title": "Sumatra PDF/MuPDF lex_number() Fixes for function integer overflow vulnerability",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=108035"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006573"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-132"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-190",
        "trust": 1.0
      },
      {
        "problemtype": "Integer overflow or wraparound (CWE-190) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006573"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-5340"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://www.exploit-db.com/exploits/23246"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5340"
      },
      {
        "trust": 1.0,
        "url": "https://bugs.ghostscript.com/show_bug.cgi?id=693371"
      },
      {
        "trust": 1.0,
        "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=f919270b6a732ff45c3ba2d0c105e2b39e9c9bc9"
      },
      {
        "trust": 0.3,
        "url": "http://blog.kowalczyk.info/software/sumatrapdf/prerelease.html"
      },
      {
        "trust": 0.3,
        "url": "https://www.mupdf.com/"
      },
      {
        "trust": 0.3,
        "url": "http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=f919270b6a732ff45c3ba2d0c105e2b39e9c9bc9"
      },
      {
        "trust": 0.3,
        "url": "http://blog.kowalczyk.info/software/sumatrapdf/free-pdf-reader.html"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.2,
        "url": "http://www.exploit-db.com/exploits/23246/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/blog/325/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=51544"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/51544/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/51544/"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=51511"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/51511/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/51511/#comments"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "56875"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006573"
      },
      {
        "db": "PACKETSTORM",
        "id": "118778"
      },
      {
        "db": "PACKETSTORM",
        "id": "118777"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-132"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-5340"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "56875"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006573"
      },
      {
        "db": "PACKETSTORM",
        "id": "118778"
      },
      {
        "db": "PACKETSTORM",
        "id": "118777"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-132"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-5340"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-12-09T00:00:00",
        "db": "BID",
        "id": "56875"
      },
      {
        "date": "2020-02-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-006573"
      },
      {
        "date": "2012-12-12T10:00:36",
        "db": "PACKETSTORM",
        "id": "118778"
      },
      {
        "date": "2012-12-12T10:00:33",
        "db": "PACKETSTORM",
        "id": "118777"
      },
      {
        "date": "2012-12-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201212-132"
      },
      {
        "date": "2020-01-23T22:15:09.683000",
        "db": "NVD",
        "id": "CVE-2012-5340"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-12-09T00:00:00",
        "db": "BID",
        "id": "56875"
      },
      {
        "date": "2020-02-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-006573"
      },
      {
        "date": "2020-05-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201212-132"
      },
      {
        "date": "2024-09-12T18:15:05.503000",
        "db": "NVD",
        "id": "CVE-2012-5340"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-132"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SumatraPDF\u00a0 and \u00a0MuPDF\u00a0 Vulnerable to integer overflow",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006573"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-132"
      }
    ],
    "trust": 0.6
  }
}