CVE-2022-35091: n/a in n/a
SWFTools commit 772e55a2 was discovered to contain a floating point exception (FPE) via DCTStream::readMCURow() at /xpdf/Stream.cc.ow()
AI Analysis
Technical Summary
CVE-2022-35091 is a medium severity vulnerability identified in the SWFTools project, specifically within the codebase related to PDF processing. The issue arises from a floating point exception (FPE) in the function DCTStream::readMCURow() located in the file /xpdf/Stream.cc.ow(). This function is responsible for reading Minimum Coded Unit (MCU) rows during the decoding of JPEG images embedded in PDF files. A floating point exception typically occurs due to invalid arithmetic operations such as division by zero or overflow, which can cause the application to crash or behave unexpectedly. In this case, the vulnerability can be triggered by processing a specially crafted PDF file containing malicious JPEG streams, leading to an application crash and denial of service (DoS). The CVSS 3.1 base score is 5.5, indicating a medium severity level. The vector indicates that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but requires user interaction (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity impact. There are no known exploits in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-697, which relates to improper control of a resource through its lifetime, in this case, improper handling of floating point operations during image decoding.
Potential Impact
For European organizations, the primary impact of CVE-2022-35091 is the potential for denial of service in applications or services that utilize SWFTools or related PDF processing libraries that include the vulnerable DCTStream::readMCURow() function. This could affect document processing workflows, automated PDF parsing, or any system that ingests PDFs with embedded JPEG images. While the vulnerability does not compromise confidentiality or integrity, disruption of availability can impact business operations, especially in sectors relying heavily on automated document handling such as legal, financial, and governmental institutions. Since the attack vector requires local access and user interaction, the risk is somewhat mitigated in environments with strict user controls and limited local access. However, organizations that allow users to open untrusted PDFs locally or have automated systems processing PDFs without sufficient validation may be vulnerable to crashes or service interruptions. The lack of known exploits reduces immediate risk, but the presence of a floating point exception vulnerability in widely used tools warrants attention to prevent future exploitation or accidental disruptions.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Identify and inventory all systems and applications using SWFTools or related PDF processing libraries that might include the vulnerable function. 2) Restrict local access to systems processing PDFs to trusted users only, minimizing the chance of malicious PDF files being opened. 3) Implement strict input validation and sandboxing for PDF processing workflows to isolate and contain potential crashes caused by malformed files. 4) Monitor for updates or patches from SWFTools or related projects and apply them promptly once available. 5) Consider deploying alternative PDF processing tools with a strong security track record if patching is delayed. 6) Educate users about the risks of opening untrusted PDF files and enforce policies to avoid processing suspicious documents. 7) Employ application whitelisting and endpoint protection to detect and prevent exploitation attempts that might leverage this vulnerability indirectly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2022-35091: n/a in n/a
Description
SWFTools commit 772e55a2 was discovered to contain a floating point exception (FPE) via DCTStream::readMCURow() at /xpdf/Stream.cc.ow()
AI-Powered Analysis
Technical Analysis
CVE-2022-35091 is a medium severity vulnerability identified in the SWFTools project, specifically within the codebase related to PDF processing. The issue arises from a floating point exception (FPE) in the function DCTStream::readMCURow() located in the file /xpdf/Stream.cc.ow(). This function is responsible for reading Minimum Coded Unit (MCU) rows during the decoding of JPEG images embedded in PDF files. A floating point exception typically occurs due to invalid arithmetic operations such as division by zero or overflow, which can cause the application to crash or behave unexpectedly. In this case, the vulnerability can be triggered by processing a specially crafted PDF file containing malicious JPEG streams, leading to an application crash and denial of service (DoS). The CVSS 3.1 base score is 5.5, indicating a medium severity level. The vector indicates that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but requires user interaction (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity impact. There are no known exploits in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-697, which relates to improper control of a resource through its lifetime, in this case, improper handling of floating point operations during image decoding.
Potential Impact
For European organizations, the primary impact of CVE-2022-35091 is the potential for denial of service in applications or services that utilize SWFTools or related PDF processing libraries that include the vulnerable DCTStream::readMCURow() function. This could affect document processing workflows, automated PDF parsing, or any system that ingests PDFs with embedded JPEG images. While the vulnerability does not compromise confidentiality or integrity, disruption of availability can impact business operations, especially in sectors relying heavily on automated document handling such as legal, financial, and governmental institutions. Since the attack vector requires local access and user interaction, the risk is somewhat mitigated in environments with strict user controls and limited local access. However, organizations that allow users to open untrusted PDFs locally or have automated systems processing PDFs without sufficient validation may be vulnerable to crashes or service interruptions. The lack of known exploits reduces immediate risk, but the presence of a floating point exception vulnerability in widely used tools warrants attention to prevent future exploitation or accidental disruptions.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Identify and inventory all systems and applications using SWFTools or related PDF processing libraries that might include the vulnerable function. 2) Restrict local access to systems processing PDFs to trusted users only, minimizing the chance of malicious PDF files being opened. 3) Implement strict input validation and sandboxing for PDF processing workflows to isolate and contain potential crashes caused by malformed files. 4) Monitor for updates or patches from SWFTools or related projects and apply them promptly once available. 5) Consider deploying alternative PDF processing tools with a strong security track record if patching is delayed. 6) Educate users about the risks of opening untrusted PDF files and enforce policies to avoid processing suspicious documents. 7) Employ application whitelisting and endpoint protection to detect and prevent exploitation attempts that might leverage this vulnerability indirectly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-07-04T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f84020acd01a249264e5b
Added to database: 5/22/2025, 8:07:30 PM
Last enriched: 7/8/2025, 5:41:08 AM
Last updated: 8/2/2025, 12:47:50 PM
Views: 10
Related Threats
CVE-2025-8113: CWE-79 Cross-Site Scripting (XSS) in Ebook Store
UnknownCVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.