Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://seclists.org/oss-sec/2014/q1/375 | mailing-list x_refsource_MLIST |
| http://lists.opensuse.org/opensuse-updates/2014-02/msg00088.html | vendor-advisory x_refsource_SUSE |
| http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=60dabde18d7fe12b19da8b509bdfee9cc886aafc | x_refsource_CONFIRM |
| http://www.osvdb.org/102340 | vdb-entry x_refsource_OSVDB |
| http://www.hdwsec.fr/blog/mupdf.html | x_refsource_MISC |
| http://www.debian.org/security/2014/dsa-2951 | vendor-advisory x_refsource_DEBIAN |
| http://bugs.ghostscript.com/show_bug.cgi?id=694957 | x_refsource_CONFIRM |
| http://seclists.org/fulldisclosure/2014/Jan/130 | mailing-list x_refsource_FULLDISC |
| http://secunia.com/advisories/58904 | third-party-advisory x_refsource_SECUNIA |
| http://www.securityfocus.com/bid/65036 | vdb-entry x_refsource_BID |
| http://www.exploit-db.com/exploits/31090 | exploit x_refsource_EXPLOIT-DB |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://seclists.org/oss-sec/2014/q1/375 | mailing-list x_refsource_MLIST x_transferred |
| http://lists.opensuse.org/opensuse-updates/2014-02/msg00088.html | vendor-advisory x_refsource_SUSE x_transferred |
| http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=60dabde18d7fe12b19da8b509bdfee9cc886aafc | x_refsource_CONFIRM x_transferred |
| http://www.osvdb.org/102340 | vdb-entry x_refsource_OSVDB x_transferred |
| http://www.hdwsec.fr/blog/mupdf.html | x_refsource_MISC x_transferred |
| http://www.debian.org/security/2014/dsa-2951 | vendor-advisory x_refsource_DEBIAN x_transferred |
| http://bugs.ghostscript.com/show_bug.cgi?id=694957 | x_refsource_CONFIRM x_transferred |
| http://seclists.org/fulldisclosure/2014/Jan/130 | mailing-list x_refsource_FULLDISC x_transferred |
| http://secunia.com/advisories/58904 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.securityfocus.com/bid/65036 | vdb-entry x_refsource_BID x_transferred |
| http://www.exploit-db.com/exploits/31090 | exploit x_refsource_EXPLOIT-DB x_transferred |