Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2017-6060

Published: 15 March 2017

Stack-based buffer overflow in jstest_main.c in mujstest in Artifex Software, Inc. MuPDF 1.10a allows remote attackers to have unspecified impact via a crafted image.

Notes

AuthorNote
sbeattie
mujstest is built during build, but not included in binary package

Priority

Negligible

Cvss 3 Severity Score

7.8

Score breakdown

Status

Package Release Status
mupdf
Launchpad, Ubuntu, Debian
artful Ignored
(end of life)
bionic Not vulnerable
(code not present)
cosmic Not vulnerable
(code not present)
disco Not vulnerable
(code not present)
eoan Not vulnerable
(code not present)
focal Not vulnerable
(code not present)
groovy Not vulnerable
(code not present)
hirsute Not vulnerable
(code not present)
impish Not vulnerable
(code not present)
jammy Not vulnerable
(code not present)
kinetic Not vulnerable
(code not present)
lunar Not vulnerable
(code not present)
mantic Not vulnerable
(code not present)
noble Not vulnerable
(code not present)
precise Ignored
(end of life)
trusty Does not exist
(trusty was needed)
upstream
Released (1.1.12)
xenial Needed

yakkety Ignored
(end of life)
zesty Ignored
(end of life)
Patches:
upstream: http://git.ghostscript.com/?p=user/sebras/mupdf.git;a=blobdiff;f=platform/x11/jstest_main.c;h=f158d9628ed0c0a84e37fe128277679e8334422a;hp=13c3a0a3ba3ff4aae29f6882d23740833c1d842f;hb=06a012a42c9884e3cd653e7826cff1ddec04eb6e;hpb=34e18d127a02146e3415b33c4b67389ce1ddb614
upstream: http://git.ghostscript.com/?p=mupdf.git;a=blobdiff;f=platform/x11/jstest_main.c;h=768d67f1021acee03e54d1435cfa3c984f781027;hp=264e2ec7bf8c1c620fb396f8e84a8d31053ca71d;hb=cfe8f35bca61056363368c343be36812abde0a06;hpb=d5f302b88925a879d1d3a760b1e0c8aeaff7159c
upstream: http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=e089b2e2c1d38c5696c7dfd741e21f8f3ef22b14

Severity score breakdown

Parameter Value
Base score 7.8
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H