CVE-2021-25786
Published: 11 August 2023
An issue was discovered in QPDF version 10.0.4, allows remote attackers to execute arbitrary code via crafted .pdf file to Pl_ASCII85Decoder::write parameter in libqpdf.
Notes
Author | Note |
---|---|
mdeslaur | This appears to be a dupe of CVE-2021-36978, same bug and fix commits. Updating as such. |
Priority
Status
Package | Release | Status |
---|---|---|
qpdf Launchpad, Ubuntu, Debian |
bionic |
Released
(8.0.2-3ubuntu0.1)
|
focal |
Released
(9.1.1-1ubuntu0.1)
|
|
jammy |
Not vulnerable
(10.6.3-1)
|
|
lunar |
Not vulnerable
|
|
mantic |
Not vulnerable
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Released
(10.1.0-1)
|
|
xenial |
Released
(8.0.2-3~16.04.1+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
Patches: upstream: https://github.com/qpdf/qpdf/commit/dc92574c10f3e2516ec6445b88c5d584f40df4e5 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.3 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | Low |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |