SB2023122638 - Multiple DoS vulnerabilities in MuPDF
Published: December 26, 2023 Updated: November 26, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Division by zero (CVE-ID: CVE-2023-51107)
The vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to a divide by zero error within the compute_color() function in jquant2.c. A remote attacker can trick the victim into opening a specially crafted PDF file and crash the application.
2) Division by zero (CVE-ID: CVE-2023-51106)
The vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to a divide by zero error within the pnm_binary_read_image() function in load-pnm.c. A remote attacker can trick the victim into opening a specially crafted PDF file and crash the application.
3) Division by zero (CVE-ID: CVE-2023-51105)
The vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to a divide by zero error within the bmp_decompress_rle4() function in load-bmp.c. A remote attacker can trick the victim into opening a specially crafted PDF file and crash the application.
4) Division by zero (CVE-ID: CVE-2023-51104)
The vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to a divide by zero error within the pnm_binary_read_image() function in load-pnm.c. A remote attacker can trick the victim into opening a specially crafted PDF file and crash the application.
5) Division by zero (CVE-ID: CVE-2023-51103)
The vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to a divide by zero error within the fz_new_pixmap_from_float_data() function in pixmap.c. A remote attacker can trick the victim into opening a specially crafted PDF file and crash the application.
Remediation
Install update from vendor's website.
References
- https://github.com/dongyuma/sox-defects/blob/main/mupdf-defects.md
- http://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=cee86dc519d5270a3b96476ad15809ceace64a26
- https://bugs.ghostscript.com/show_bug.cgi?id=707622
- http://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=0c06a4e51519515615f6ab2d5b1f25da6771e1f4
- https://bugs.ghostscript.com/show_bug.cgi?id=707621
- http://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=f1b5f87edd2675d5c79301e4ef2e1139f67f904b
- https://bugs.ghostscript.com/show_bug.cgi?id=707620