{"id":"CVE-2017-11627","details":"A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the PointerHolder function in PointerHolder.hh, aka an \"infinite loop.\"","modified":"2026-03-14T14:22:36.070556Z","published":"2017-07-25T23:29:00.467Z","related":["MGASA-2017-0237","MGASA-2018-0145","SUSE-SU-2018:3066-1","SUSE-SU-2018:3066-2","openSUSE-SU-2024:11289-1"],"references":[{"type":"WEB","url":"https://usn.ubuntu.com/3638-1/"},{"type":"EVIDENCE","url":"http://somevulnsofadlab.blogspot.jp/2017/07/qpdfan-infinite-loop-in-libqpdf_21.html"},{"type":"EVIDENCE","url":"https://github.com/qpdf/qpdf/issues/118"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/qpdf/qpdf","events":[{"introduced":"0"},{"last_affected":"b7302a9b727d28d59bff0f0f7d8d62ff6486aef6"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"6.0.0"}]}}],"versions":["release-qpdf-2.0","release-qpdf-2.0.1","release-qpdf-2.0.2","release-qpdf-2.0.3","release-qpdf-2.0.4","release-qpdf-2.0.5","release-qpdf-2.0.6","release-qpdf-2.1","release-qpdf-2.1.1","release-qpdf-2.1.2","release-qpdf-2.1.3","release-qpdf-2.1.4","release-qpdf-2.1.5","release-qpdf-2.1.rc1","release-qpdf-2.2.0","release-qpdf-2.2.1","release-qpdf-2.2.2","release-qpdf-2.2.3","release-qpdf-2.2.4","release-qpdf-2.2.rc1","release-qpdf-2.3.0","release-qpdf-2.3.1","release-qpdf-3.0.0","release-qpdf-3.0.1","release-qpdf-3.0.2","release-qpdf-3.0.rc1","release-qpdf-4.0.0","release-qpdf-4.0.1","release-qpdf-4.1.0","release-qpdf-4.2.0","release-qpdf-5.0.0","release-qpdf-5.0.1","release-qpdf-5.1.0","release-qpdf-5.1.1","release-qpdf-5.1.2","release-qpdf-5.1.3","release-qpdf-5.2.0","release-qpdf-6.0.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-11627.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}