pypdf is an open source, pure-python PDF library. In affected versions an attacker may craft a PDF which leads to an infinite loop if `__parse_content_stream` is executed. That is, for example, the case if the user extracted text from such a PDF. This issue was introduced in pull request #969 and resolved in pull request #1828. Users are advised to upgrade. Users unable to upgrade may modify the line `while peek not in (b"\r", b"\n")` in `pypdf/generic/_data_structures.py` to `while peek not in (b"\r", b"\n", b"")`.
History

Tue, 03 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-06-27T21:24:30.685Z

Updated: 2024-12-03T16:56:06.186Z

Reserved: 2023-06-21T18:50:41.700Z

Link: CVE-2023-36464

cve-icon Vulnrichment

Updated: 2024-08-02T16:45:57.117Z

cve-icon NVD

Status : Modified

Published: 2023-06-27T22:15:11.790

Modified: 2024-11-21T08:09:45.950

Link: CVE-2023-36464

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-06-28T00:00:00Z

Links: CVE-2023-36464 - Bugzilla