Artifex MuPDF 1.10a pdf-layer.c count_entries PDF Document memory corruption
A vulnerability classified as problematic was found in Artifex MuPDF 1.10a. Affected by this vulnerability is the function
count_entries of the file pdf-layer.c. The manipulation as part of PDF Document leads to memory corruption. The CWE definition for the vulnerability is CWE-119. The bug was discovered 12/01/2016. The weakness was published 04/03/2017 as FEDORA-2017-2d11503623 (Website). It is possible to read the advisory at bugs.ghostscript.com.
This vulnerability is known as CVE-2016-10221. The attack needs to be approached locally. Technical details are available. There is no exploit available. The pricing for an exploit might be around USD $0-$5k at the moment.
It is declared as not defined. The vulnerability was handled as a non-public zero-day exploit for at least 123 days. We expect the 0-day to have been worth approximately $0-$5k. The vulnerability scanner Nessus provides a plugin with the ID 99406 (Fedora 25 : mupdf (2017-2d11503623)), which helps to determine the existence of the flaw in a target environment. The commercial vulnerability scanner Qualys is able to test this issue with plugin 170568 (OpenSUSE Security Update for mupdf (openSUSE-SU-2017:3064-1)).
It is recommended to upgrade the affected component. A possible mitigation has been published 2 weeks after the disclosure of the vulnerability.
The vulnerability is also documented other vulnerability databases: Tenable (99406).
Do you know our Splunk app?
Download it now for free!