You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
PyPDF2 quadratic runtime with malformed PDF missing xref marker
Moderate severity
GitHub Reviewed
Published
Jun 30, 2023
in
py-pdf/pypdf
•
Updated Nov 6, 2023
An attacker who uses this vulnerability can craft a PDF which leads to unexpected long runtime.
This quadratic runtime blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage.
An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached.
Learn more on MITRE.
Impact
An attacker who uses this vulnerability can craft a PDF which leads to unexpected long runtime.
This quadratic runtime blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage.
Patches
py-pdf/pypdf#808
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
References
References