Vulnerability Name: | CVE-2017-6060 (CCN-123462) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2017-02-18 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2017-02-18 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-04-18 | ||||||||||||||||||||||||||||||||||||||||
Summary: | Stack-based buffer overflow in jstest_main.c in mujstest in Artifex Software, Inc. MuPDF 1.10a allows remote attackers to have unspecified impact via a crafted image. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
5.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-6060 Source: CCN Type: MuPDF Web site MuPDF Source: CCN Type: oss-sec Mailing List, Sat, 18 Feb 2017 12:38:45 +0100 mupdf: mujstest: stack-based buffer overflow in main (jstest_main.c) Source: MLIST Type: Exploit, Mailing List, Third Party Advisory [oss-security] 20170218 mupdf: mujstest: stack-based buffer overflow in main (jstest_main.c) Source: BID Type: Broken Link 96266 Source: CCN Type: BID-96266 MuPDF 'jstest_main.c' Stack Buffer Overflow Vulnerability Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory, VDB Entry https://blogs.gentoo.org/ago/2017/02/17/mupdf-mujstest-stack-based-buffer-overflow-in-main-jstest_main-c/ Source: MISC Type: Exploit, Third Party Advisory https://bugs.ghostscript.com/show_bug.cgi?id=697551 Source: XF Type: UNKNOWN mupdf-cve20176060-bo(123462) Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20210923 [SECURITY] [DLA 2765-1] mupdf security update Source: GENTOO Type: Third Party Advisory GLSA-201706-08 | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |