Impact
VeryPDF PCL Converter 2.7 is vulnerable to a buffer overflow that can trigger a denial of service. The flaw occurs when a user supplies an overly long password in the PDF Security encryption fields. Providing a 3000‑byte password overflows internal buffers, causing the application to crash during PCL file processing.
Affected Systems
The vulnerability applies to the VeryPDF PCL Converter product, specifically version 2.7 as identified by the vendor and the CPE string. No other vendors or versions are listed as affected.
Risk and Exploitability
The CVSS base score is 6.9, indicating moderate impact. No EPSS score or KEV listing is available, implying limited public exploitation evidence. Exploitation requires local access to the machine where the application runs; the attacker must supply a malicious PDF file with a crafted password. Until a vendor update is applied, the risk remains for systems running the affected version.
OpenCVE Enrichment