logo

CVE-2023-46250 pypdf

Package

Manager: pip
Name: pypdf
Vulnerable Version: >=3.7.0 <3.17.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00089 pctl0.26264

Details

Possible Infinite Loop when PdfWriter(clone_from) is used with a PDF ### Impact An attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. That is, for example, the case when the pypdf-user manipulates an incoming malicious PDF e.g. by merging it with another PDF or by adding annotations. ### Patches The issue was fixed with #2264 ### Workarounds If you cannot update your version of pypdf, you should modify `pypdf/generic/_data_structures.py` just like #2264 did.

Metadata

Created: 2023-10-31T22:22:50Z
Modified: 2023-10-31T22:22:50Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-wjcc-cq79-p63f/GHSA-wjcc-cq79-p63f.json
CWE IDs: ["CWE-835"]
Alternative ID: GHSA-wjcc-cq79-p63f
Finding: F138
Auto approve: 1