PDFio is a simple C library for reading and writing PDF files. There is a denial of service (DOS) vulnerability in the TTF parser. Maliciously crafted TTF files can cause the program to utilize 100% of the Memory and enter an infinite loop. This can also lead to a heap-buffer-overflow vulnerability. An infinite loop occurs in the read_camp function by nGroups value. The ttf.h library is vulnerable. A value called nGroups is extracted from the file, and by changing that value, you can cause the program to utilize 100% of the Memory and enter an infinite loop. If the value of nGroups in the file is small, an infinite loop will not occur. This library, whether used as a standalone binary or as part of another application, is vulnerable to DOS attacks when parsing certain types of files. Automated systems, including web servers that use this code to convert PDF submissions into plaintext, can be DOSed if an attacker uploads a malicious TTF file. This issue has been addressed in release version 1.3.1. All users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Mon, 12 Aug 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Msweet
Msweet pdfio
CPEs cpe:2.3:a:msweet:pdfio:*:*:*:*:*:*:*:*
Vendors & Products Msweet
Msweet pdfio

Tue, 06 Aug 2024 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Pdfio Project
Pdfio Project pdfio
CPEs cpe:2.3:a:pdfio_project:pdfio:*:*:*:*:*:*:*:*
Vendors & Products Pdfio Project
Pdfio Project pdfio
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 06 Aug 2024 17:15:00 +0000

Type Values Removed Values Added
Description PDFio is a simple C library for reading and writing PDF files. There is a denial of service (DOS) vulnerability in the TTF parser. Maliciously crafted TTF files can cause the program to utilize 100% of the Memory and enter an infinite loop. This can also lead to a heap-buffer-overflow vulnerability. An infinite loop occurs in the read_camp function by nGroups value. The ttf.h library is vulnerable. A value called nGroups is extracted from the file, and by changing that value, you can cause the program to utilize 100% of the Memory and enter an infinite loop. If the value of nGroups in the file is small, an infinite loop will not occur. This library, whether used as a standalone binary or as part of another application, is vulnerable to DOS attacks when parsing certain types of files. Automated systems, including web servers that use this code to convert PDF submissions into plaintext, can be DOSed if an attacker uploads a malicious TTF file. This issue has been addressed in release version 1.3.1. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Title Loop with Unreachable Exit Condition ('Infinite Loop') in pdfio
Weaknesses CWE-835
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-08-06T17:02:52.693Z

Updated: 2024-08-06T18:34:37.214Z

Reserved: 2024-07-30T14:01:33.922Z

Link: CVE-2024-42358

cve-icon Vulnrichment

Updated: 2024-08-06T18:34:29.727Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-06T17:15:54.103

Modified: 2024-08-12T18:50:20.967

Link: CVE-2024-42358

cve-icon Redhat

No data.