CVE-2017-5896

NameCVE-2017-5896
DescriptionHeap-based buffer overflow in the fz_subsample_pixmap function in fitz/pixmap.c in MuPDF 1.10a allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted image.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-3797-1
NVD severitymedium (attack range: remote)
Debian Bugs854734

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mupdf (PTS)wheezy0.9-2+deb7u2fixed
wheezy (security)0.9-2+deb7u4fixed
jessie (security), jessie1.5-1+deb8u3fixed
stretch (security), stretch1.9a+ds1-4+deb9u2fixed
buster, sid1.11+ds1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mupdfsource(unstable)1.9a+ds1-3medium854734
mupdfsourcejessie1.5-1+deb8u2mediumDSA-3797-1
mupdfsourcewheezy(not affected)

Notes

[wheezy] - mupdf <not-affected> (vulnerable code not present)
https://bugs.ghostscript.com/show_bug.cgi?id=697515
Fix http://git.ghostscript.com/?p=mupdf.git;h=2c4e5867ee699b1081527bc6c6ea0e99a35a5c27
https://blogs.gentoo.org/ago/2017/02/09/mupdf-use-after-free-in-fz_subsample_pixmap-pixmap-c/
http://www.openwall.com/lists/oss-security/2017/02/10/1

Search for package or bug name: Reporting problems