{"id":"CVE-2024-46657","details":"Artifex Software mupdf v1.24.9 was discovered to contain a segmentation fault via the component /tools/pdfextract.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.","modified":"2026-04-12T09:38:26.659730Z","published":"2024-12-10T17:15:10.287Z","references":[{"type":"FIX","url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/diff/?id=b5c898a30f068b5342e8263a2cd5b9f0be291aac"},{"type":"FIX","url":"https://gist.github.com/isumitpatel/615e6bd2621cb46b5d980ddb9db223e2"},{"type":"FIX","url":"https://github.com/ArtifexSoftware/mupdf/commit/b5c898a30f068b5342e8263a2cd5b9f0be291aac"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/artifexsoftware/mupdf","events":[{"introduced":"0"},{"last_affected":"b605215666105cb401648a4fac507d2c2c895dea"},{"fixed":"b5c898a30f068b5342e8263a2cd5b9f0be291aac"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.24.9"}]}}],"versions":["0.1","0.2","0.3","0.4","0.5","0.6","0.7","0.8","0.9","1.0","1.0rc1","1.1-forms-tech-preview","1.10","1.10-rc1","1.10-rc2","1.11","1.11-rc1","1.11.1","1.12.0","1.13.0","1.13.0-rc1","1.14.0","1.14.0-rc1","1.15.0","1.15.0-rc1","1.16.0","1.16.0-rc1","1.16.0-rc2","1.16.1","1.16.1-epub-prerelease","1.17.0-rc1","1.18.0","1.18.0-rc1","1.18.1-so-3.12.1-android","1.18.1-so-3.12.1-ios","1.18.1-so-3.12.2b1-android","1.18.1-so-3.12.2b1-ios","1.18.1-so-3.12.4","1.18.1-so-3.12.6","1.19.0-rc1","1.19.0-rc1-so-3.12.7","1.2","1.20.0-rc1","1.21.0-rc1","1.22.0-rc1","1.23.0","1.23.0-rc1","1.24.0","1.24.0-rc1","1.24.1","1.24.2","1.24.3","1.24.4","1.24.5","1.24.6","1.24.7","1.24.8","1.24.9","1.3rc1","1.4","1.4-ios","1.5","1.5-ios","1.5-ios-appstore","1.5-ios-rc6","1.5-ios-rc7","1.5-ios-rc8","1.6","1.6-appstore","1.6-ios-rc1","1.6-ios-rc2","1.7","1.7-rc1","1.7a","1.8","1.9","1.9-rc1","1.9-rc2","1.9a","android-release-60"],"database_specific":{"vanir_signatures_modified":"2026-04-12T09:38:26Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-46657.json","vanir_signatures":[{"deprecated":false,"source":"https://github.com/artifexsoftware/mupdf/commit/b5c898a30f068b5342e8263a2cd5b9f0be291aac","digest":{"length":1430,"function_hash":"265883868962132886299126901051446672956"},"signature_version":"v1","signature_type":"Function","id":"CVE-2024-46657-69f69434","target":{"file":"source/tools/pdfextract.c","function":"saveimage"}},{"deprecated":false,"source":"https://github.com/artifexsoftware/mupdf/commit/b5c898a30f068b5342e8263a2cd5b9f0be291aac","digest":{"length":371,"function_hash":"206794094443812336654510603349199866196"},"signature_version":"v1","signature_type":"Function","id":"CVE-2024-46657-711564f9","target":{"file":"source/tools/pdfextract.c","function":"extractobject"}},{"deprecated":false,"source":"https://github.com/artifexsoftware/mupdf/commit/b5c898a30f068b5342e8263a2cd5b9f0be291aac","digest":{"threshold":0.9,"line_hashes":["60221485186903629483164233264619531159","42680479782799191035220029654441052339","73992952805821741165437266193928768774","208068077824898097147079480235553508173","45915449676458556673046216867361013810","187480229153792040606308251047000415217","338268720704859041451746078969909119465","336957922570581112895340653678732432998"]},"signature_version":"v1","signature_type":"Line","id":"CVE-2024-46657-dd512bbd","target":{"file":"source/tools/pdfextract.c"}}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}