NA

CVE-2023-36464

Published: 27/06/2023 Updated: 06/07/2023
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

pypdf is an open source, pure-python PDF library. In affected versions an attacker may craft a PDF which leads to an infinite loop if `__parse_content_stream` is executed. That is, for example, the case if the user extracted text from such a PDF. This issue was introduced in pull request #969 and resolved in pull request #1828. Users are advised to upgrade. Users unable to upgrade may modify the line `while peek not in (b"\r", b"\n")` in `pypdf/generic/_data_structures.py` to `while peek not in (b"\r", b"\n", b"")`.

Vulnerable Product Search on Vulmon Subscribe to Product

pypdf2 project pypdf2

pypdf project pypdf

Vendor Advisories

Debian Bug report logs - #1040338 pypdf: CVE-2023-36464 Package: src:pypdf; Maintainer for src:pypdf is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 4 Jul 2023 15:39:01 UTC Severity: important Tags: security, upstream Found in version pypdf/341-1 ...
DescriptionThe MITRE CVE dictionary describes this issue as: pypdf is an open source, pure-python PDF library In affected versions an attacker may craft a PDF which leads to an infinite loop if `__parse_content_stream` is executed That is, for example, the case if the user extracted text from such a PDF This issue was introduced in pull request ...