{"id":"CVE-2020-26519","details":"Artifex MuPDF before 1.18.0 has a heap based buffer over-write when parsing JBIG2 files allowing attackers to cause a denial of service.","modified":"2026-03-20T11:35:50.892772Z","published":"2020-10-02T06:15:12.487Z","references":[{"type":"WEB","url":"http://git.ghostscript.com/?p=mupdf.git%3Ba=commit%3Bh=af1e390a2c7abceb32676ec684cd1dbb92907ce8"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOF4PX2A5TGKKPMXINADSOJJ4H5UUMKK/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJMBKWVY7ZBIQV3EU5YHEFH5XWV4PABG/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00012.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202105-30"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4794"},{"type":"REPORT","url":"https://bugs.ghostscript.com/show_bug.cgi?id=702937"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/artifexsoftware/mupdf","events":[{"introduced":"0"},{"fixed":"ea5799e01730c4aa15cddd1023700e4f7b78cc27"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.18.0"}]}}],"versions":["0.1","0.2","0.3","0.4","0.5","0.6","0.7","0.8","0.9","1.0","1.0rc1","1.1","1.1-forms-tech-preview","1.10","1.10-rc1","1.10-rc2","1.11","1.11-rc1","1.11.1","1.12.0","1.13.0","1.13.0-rc1","1.14.0","1.14.0-rc1","1.15.0","1.15.0-rc1","1.16.0","1.16.0-rc1","1.16.0-rc2","1.16.1","1.16.1-epub-prerelease","1.17.0","1.17.0-rc1","1.18.0-rc1","1.2","1.3","1.3rc1","1.4","1.4-ios","1.5","1.5-ios","1.5-ios-appstore","1.5-ios-rc6","1.5-ios-rc7","1.5-ios-rc8","1.6","1.6-appstore","1.6-ios-rc1","1.6-ios-rc2","1.7","1.7-rc1","1.7a","1.8","1.9","1.9-rc1","1.9-rc2","1.9a","android-release-60"],"database_specific":{"vanir_signatures":[{"id":"CVE-2020-26519-91bd22d4","deprecated":false,"signature_version":"v1","source":"https://github.com/artifexsoftware/mupdf/commit/ea5799e01730c4aa15cddd1023700e4f7b78cc27","digest":{"threshold":0.9,"line_hashes":["76920546631759322246527467490251199875","340040321338536262114100541643141255870","116442093724906783824796458210151561654","39735944821352736364414258139594747771","201723191520396315939464895643274110115","20129206999309322410363543612250604961","253549865349229191539173383921154422334","69739083799557896998941262877448309888","96840014772434106414225453686075656896","269940169438491882205853047335703195872","193123336443576537584243481354558573900","470424901104694111857759229088345522","148528187658349439914426295209030690800","36862906143268150745729279185893731936","14075825109739105745149694780895933509","137502807814932668203387647412756923614","97603555291672204948109317861153438342","326261060561488912049801467062038365194","255897402392510710039415928318102135017","310965173133449292282000847890337953773"]},"signature_type":"Line","target":{"file":"source/tools/murun.c"}},{"id":"CVE-2020-26519-e21e7b3e","deprecated":false,"signature_version":"v1","source":"https://github.com/artifexsoftware/mupdf/commit/ea5799e01730c4aa15cddd1023700e4f7b78cc27","digest":{"function_hash":"251675964121664698738070537556026348583","length":23845},"signature_type":"Function","target":{"function":"murun_main","file":"source/tools/murun.c"}}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-26519.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}