CVE-2016-9601
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
24/04/2018
Last modified:
07/11/2023
Description
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:* | 9.21 (excluding) | |
cpe:2.3:a:artifex:jbig2dec:*:*:*:*:*:*:*:* | 0.13 (including) | |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.ghostscript.com/?p=jbig2dec.git%3Ba%3Dcommit%3Bh%3De698d5c11d27212aa1098bc5b1673a3378563092
- http://www.securityfocus.com/bid/97095
- https://bugs.ghostscript.com/show_bug.cgi?id=697457
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9601
- https://security.gentoo.org/glsa/201706-24
- https://www.debian.org/security/2017/dsa-3817