CVE-2016-10141

An integer overflow vulnerability was observed in the regemit function in regexp.c in Artifex Software, Inc. MuJS before fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045. The attack requires a regular expression with nested repetition. A successful exploitation of this issue can lead to code execution or a denial of service (buffer overflow) condition.
Configurations

Configuration 1 (hide)

cpe:2.3:a:artifex:mujs:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:43

Type Values Removed Values Added
References () http://git.ghostscript.com/?p=mujs.git%3Bh=fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045 - () http://git.ghostscript.com/?p=mujs.git%3Bh=fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045 -
References () http://www.securityfocus.com/bid/95876 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/95876 - Third Party Advisory, VDB Entry
References () https://bugs.ghostscript.com/show_bug.cgi?id=697448 - Issue Tracking () https://bugs.ghostscript.com/show_bug.cgi?id=697448 - Issue Tracking

07 Nov 2023, 02:29

Type Values Removed Values Added
References
  • {'url': 'http://git.ghostscript.com/?p=mujs.git;h=fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045', 'name': 'http://git.ghostscript.com/?p=mujs.git;h=fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045', 'tags': ['Issue Tracking', 'Patch', 'Third Party Advisory'], 'refsource': 'CONFIRM'}
  • () http://git.ghostscript.com/?p=mujs.git%3Bh=fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045 -

Information

Published : 2017-01-13 09:59

Updated : 2024-11-21 02:43


NVD link : CVE-2016-10141

Mitre link : CVE-2016-10141

CVE.ORG link : CVE-2016-10141


JSON object : View

Products Affected

artifex

  • mujs
CWE
CWE-190

Integer Overflow or Wraparound