![]() ![]() On some systems-depending on the graphics settings and drivers-it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element. The fix was introduced in the iText 8.0.2 release on October 25th 2023, prior to the disclosure. ![]() NOTE: The vendor was contacted early about this vulnerability. The identifier VDB-246125 was assigned to this vulnerability. It is recommended to upgrade the affected component. Upgrading to version 8.0.2 is able to address this issue. The exploit has been disclosed to the public and may be used. This issue affects some unknown processing of the file PdfDocument.java of the component Reference Table Handler. A vulnerability, which was classified as problematic, has been found in Apryse iText 8.0.1. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |