Loop Bug 6-year life is again discovered, affecting most PDF viewers
According to German software developer Hanno Böck, an error was discovered in the PDF syntax library from 2011 to appear on the popular PDF viewers today.
According to German software developer Hanno Böck, an error was discovered in the PDF syntax library from 2011 to appear on the popular PDF viewers today.
The original bug affected the PDF syntax element on Evince, the document reader application for Linux. It was discovered by software developer Andreas Bogk, who also helped Evince fix the error and publish the results at the Chaos Communication Camp 2011 event.
Bogk discovers certain structured PDF files - cross-references to the xref table - which will cause the Evince application to enter the continuous loop, taking up CPU resources and quickly filling up the memory and crashing.
This bug is mostly ignored because it is not considered a serious security bug and only affects a small application on a Linux machine.
Bug 6 years life back on the famous PDF Viewer
Six years later, the issue became more important after Böck discovered similar behavior in many popular PDF readers. Böck found this Loop Bug on PDFium, the library allows Chrome to render PDF files in the browser without a plugin.
The pdf.js library used in Firefox is also affected. Pdf.js is also used on GitHub to render PDF files on the website interface without users downloading files to view in 3rd party applications.
Error of loop error causes the application to crash
Windows Runtime PDF Renderer Library, WinRT PDF are all affected. This is the integrated PDF viewer of Edge and is also the default PDF syntax for Windows Reader App, the default PDF viewer on Windows 8 onwards.
Similarly, open source PDF syntax like Ghostscript and QPDF is also affected, meaning there will be many PDF viewing applications on the desktop and the web using the two tools affected. Böck reported a bug to affected products and the patch will be released soon.
Adobe Reader is not affected
Adobe Reader and the integrated PDF viewer on OS X are still safe.
The researcher said he used the fuzzing library for analysis. Fuzzing is a basic security testing technique that uses a lot of random input data and analyzes the output of the output and finds anomalies. Google's security experts use this technique very often and encourage people to use it.
Böck also blames administrators for not running test suites. This is a collection of problematic files that the viewer can still open without crashing. Most perfect, the software developer must not release a new version of the application without running a successful test suite.
You should read it
- Applications that replace the default Android photo library
- How to add / remove XPS Viewer application in Windows 10
- Download PDF-XChange Viewer 2.5.322.10
- Tips for survival in Knives Crash and play guides
- How to access Event Viewer in Windows 10
- How to fix 0xc0000005 error on MS Outlook causing Oulook crash globally
- Work with the library item in Adobe Dreamweaver CS6
- Fix the latest iPhone crash
- How to enable the new interface for PDF file readers in Chrome
- Link Download Microsoft Excel Viewer 12.0.6611.1000
- Steps to use Event Viewer in Windows 10
- How to Have Fun at the Library (for Kids and Teens)
Maybe you are interested
Collection of beautiful leafy wallpapers for Power Point How to cut and join MP3 files simply and quickly How to play PC games on Android devices using Parsec How to delete old boot options in boot menu on Windows 10 How to install Everfilter image editing application on iPhone / iPad You will be dizzy and dizzy when viewing these 9 images