Impact
A flaw in the pure‑Python PDF handling library allows a specially crafted PDF to trigger prolonged decoding and significant memory usage, causing the process to hang or crash. This abuse of array‑based streams leads to resource exhaustion, denying service to legitimate users.
Affected Systems
The vulnerability affects installations of the pypdf library distributed by py-pdf that use any version earlier than 6.9.1. Software relying on those older releases will process the overloaded stream and suffer the denial of service. Upgrading to 6.9.1 or later removes the problem.
Risk and Exploitability
The CVSS score of 5.1 indicates medium severity, and the EPSS score of less than 1% suggests a low likelihood of widespread exploitation. The vulnerability is not listed in CISA’s KEV catalog, so no public exploits are known. Attackers must craft a malicious PDF with a large array‑based stream; no additional network exposure is required. The overall risk is moderate but significant for services that parse PDFs from untrusted sources.
OpenCVE Enrichment
Github GHSA