The pdf_to_num function in pdf-object.c in MuPDF before 1.10 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted file.
https://blogs.gentoo.org/ago/2016/09/22/mupdf-use-after-free-in-pdf_to_num-pdf-object-c/
http://www.securityfocus.com/bid/93127
http://www.openwall.com/lists/oss-security/2016/10/16/8
https://bugzilla.redhat.com/show_bug.cgi?id=1385685
https://bugs.ghostscript.com/show_bug.cgi?id=697019
https://bugs.ghostscript.com/show_bug.cgi?id=697015
http://www.debian.org/security/2017/dsa-3797
http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=1e03c06456d997435019fb3526fa2d4be7dbc6ec
Source: Mitre, NVD
Published: 2017-02-15
Updated: 2025-04-20
Base Score: 4.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P
Severity: Medium
Base Score: 5.5
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
EPSS: 0.00225