CVE-2023-46250
CVSS V2 None
CVSS V3 None
Description
pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions 3.7.0 through 3.16.4 can craft a PDF which leads to an infinite loop. This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. That is, for example, the case when the pypdf-user manipulates an incoming malicious PDF e.g. by merging it with another PDF or by adding annotations. The issue was fixed in version 3.17.0. As a workaround, apply the patch manually by modifying `pypdf/generic/_data_structures.py`.
Overview
- CVE ID
- CVE-2023-46250
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-10-31T15:23:32.852Z
- Last Modified Date
- 2023-10-31T15:23:32.852Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/py-pdf/pypdf/security/advisories/GHSA-wjcc-cq79-p63f | x_refsource_CONFIRM |
https://github.com/py-pdf/pypdf/pull/2264 | x_refsource_MISC |
https://github.com/py-pdf/pypdf/commit/9b23ac3c9619492570011d551d521690de9a3e2d | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-46250 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46250 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-24 22:26:15 | Added to TrackCVE |