pypdf is an open source, pure-python PDF library. In affected versions an attacker may craft a PDF which leads to an infinite loop if `__parse_content_stream` is executed. That is, for example, the case if the user extracted text from such a PDF. This issue was introduced in pull request #969 and resolved in pull request #1828. Users are advised to upgrade. Users unable to upgrade may modify the line `while peek not in (b"\r", b"\n")` in `pypdf/generic/_data_structures.py` to `while peek not in (b"\r", b"\n", b"")`.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-1690 pypdf is an open source, pure-python PDF library. In affected versions an attacker may craft a PDF which leads to an infinite loop if `__parse_content_stream` is executed. That is, for example, the case if the user extracted text from such a PDF. This issue was introduced in pull request #969 and resolved in pull request #1828. Users are advised to upgrade. Users unable to upgrade may modify the line `while peek not in (b"\r", b"\n")` in `pypdf/generic/_data_structures.py` to `while peek not in (b"\r", b"\n", b"")`.
Github GHSA Github GHSA GHSA-4vvm-4w3v-6mr8 pypdf and PyPDF2 possible Infinite Loop when a comment isn't followed by a character
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 03 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-12-03T16:56:06.186Z

Reserved: 2023-06-21T18:50:41.700Z

Link: CVE-2023-36464

cve-icon Vulnrichment

Updated: 2024-08-02T16:45:57.117Z

cve-icon NVD

Status : Modified

Published: 2023-06-27T22:15:11.790

Modified: 2024-11-21T08:09:45.950

Link: CVE-2023-36464

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-06-28T00:00:00Z

Links: CVE-2023-36464 - Bugzilla

cve-icon OpenCVE Enrichment

No data.