Heap-based buffer overflow in the js_stackoverflow function in jsrun.c in Artifex Software, Inc. MuJS allows attackers to have unspecified impact by leveraging an error when dropping extra arguments to lightweight functions.
References
Configurations
History
21 Nov 2024, 02:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.ghostscript.com/?p=mujs.git%3Ba=commit%3Bh=77ab465f1c394bb77f00966cd950650f3f53cb24 - | |
References | () http://www.openwall.com/lists/oss-security/2017/01/12/9 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2017/01/13/1 - Mailing List, Patch, Third Party Advisory | |
References | () https://bugs.ghostscript.com/show_bug.cgi?id=697401 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3U5APFS3FEBOPXUJIFWBNU55PYR7ZBF/ - |
07 Nov 2023, 02:29
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-03-24 15:59
Updated : 2024-11-21 02:43
NVD link : CVE-2016-10133
Mitre link : CVE-2016-10133
CVE.ORG link : CVE-2016-10133
JSON object : View
Products Affected
artifex
- mujs
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer