CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
Low
EPSS
Percentile
10.3%
pypdf is a free and open-source pure-python PDF library. An attacker who
uses a vulnerability present in versions 3.7.0 through 3.16.4 can craft a
PDF which leads to an infinite loop. This infinite loop blocks the current
process and can utilize a single core of the CPU by 100%. It does not
affect memory usage. That is, for example, the case when the pypdf-user
manipulates an incoming malicious PDF e.g. by merging it with another PDF
or by adding annotations. The issue was fixed in version 3.17.0. As a
workaround, apply the patch manually by modifying
pypdf/generic/_data_structures.py
.
github.com/py-pdf/pypdf/commit/9b23ac3c9619492570011d551d521690de9a3e2d
github.com/py-pdf/pypdf/commit/9b23ac3c9619492570011d551d521690de9a3e2d (3.17.0)
github.com/py-pdf/pypdf/pull/2264
github.com/py-pdf/pypdf/security/advisories/GHSA-wjcc-cq79-p63f
launchpad.net/bugs/cve/CVE-2023-46250
nvd.nist.gov/vuln/detail/CVE-2023-46250
security-tracker.debian.org/tracker/CVE-2023-46250
www.cve.org/CVERecord?id=CVE-2023-46250