{"id":"CVE-2017-14686","details":"Artifex MuPDF 1.11 allows attackers to execute arbitrary code or cause a denial of service via a crafted .xps file, related to a \"User Mode Write AV near NULL starting at wow64!Wow64NotifyDebugger+0x000000000000001d\" on Windows. This occurs because read_zip_dir_imp in fitz/unzip.c does not check whether size fields in a ZIP entry are negative numbers.","modified":"2026-04-10T03:57:15.216150Z","published":"2017-09-22T06:29:00.267Z","references":[{"type":"WEB","url":"http://git.ghostscript.com/?p=mupdf.git%3Bh=0f0fbc07d9be31f5e83ec5328d7311fdfd8328b1"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-4006"},{"type":"ADVISORY","url":"https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-14686"},{"type":"EVIDENCE","url":"https://bugs.ghostscript.com/show_bug.cgi?id=698540"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/artifexsoftware/mupdf","events":[{"introduced":"0"},{"last_affected":"34e18d127a02146e3415b33c4b67389ce1ddb614"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.11"}]}}],"versions":["0.1","0.2","0.3","0.4","0.5","0.6","0.7","0.8","0.9","1.0","1.0rc1","1.1-forms-tech-preview","1.10","1.10-rc1","1.10-rc2","1.11","1.11-rc1","1.2","1.3rc1","1.4","1.4-ios","1.5","1.5-ios","1.5-ios-appstore","1.5-ios-rc6","1.5-ios-rc7","1.5-ios-rc8","1.6","1.6-appstore","1.6-ios-rc1","1.6-ios-rc2","1.7","1.7-rc1","1.7a","1.8","1.9","1.9-rc1","1.9-rc2","1.9a","android-release-60"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-14686.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}