CVE-2014-2013
Published: 3 March 2014
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
Priority
Status
Package | Release | Status |
---|---|---|
mupdf Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Released
(0.9-2+deb7u3ubuntu0.12.04.1)
|
|
quantal |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was not-affected [1.3-2])
|
|
upstream |
Released
(1.3-2)
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Ignored
(end of life)
|
|
xenial |
Not vulnerable
(1.3-2)
|
|
Patches: upstream: http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc |
||
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. |