CVE-2016-7504

A use-after-free vulnerability was observed in Rp_toString function of Artifex Software, Inc. MuJS before 5c337af4b3df80cf967e4f9f6a21522de84b392a. A successful exploitation of this issue can lead to code execution or denial of service condition.
References
Link Resource
http://bugs.ghostscript.com/show_bug.cgi?id=697142 Exploit Vendor Advisory
http://www.securityfocus.com/bid/94241 Third Party Advisory VDB Entry
http://bugs.ghostscript.com/show_bug.cgi?id=697142 Exploit Vendor Advisory
http://www.securityfocus.com/bid/94241 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:artifex:mujs:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:58

Type Values Removed Values Added
References () http://bugs.ghostscript.com/show_bug.cgi?id=697142 - Exploit, Vendor Advisory () http://bugs.ghostscript.com/show_bug.cgi?id=697142 - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/94241 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94241 - Third Party Advisory, VDB Entry

Information

Published : 2016-10-29 01:59

Updated : 2024-11-21 02:58


NVD link : CVE-2016-7504

Mitre link : CVE-2016-7504

CVE.ORG link : CVE-2016-7504


JSON object : View

Products Affected

artifex

  • mujs
CWE
CWE-416

Use After Free