Use-after-free vulnerability in Ghostscript 9.20 might allow remote attackers to execute arbitrary code via vectors related to a reference leak in .setdevice.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2017-0013.html | |
http://www.debian.org/security/2016/dsa-3691 | |
http://www.openwall.com/lists/oss-security/2016/10/05/15 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/95336 | Third Party Advisory VDB Entry |
https://bugs.ghostscript.com/show_bug.cgi?id=697179 | Issue Tracking Patch |
https://security.gentoo.org/glsa/201702-31 | |
http://rhn.redhat.com/errata/RHSA-2017-0013.html | |
http://www.debian.org/security/2016/dsa-3691 | |
http://www.openwall.com/lists/oss-security/2016/10/05/15 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/95336 | Third Party Advisory VDB Entry |
https://bugs.ghostscript.com/show_bug.cgi?id=697179 | Issue Tracking Patch |
https://security.gentoo.org/glsa/201702-31 |
Configurations
History
21 Nov 2024, 02:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2017-0013.html - | |
References | () http://www.debian.org/security/2016/dsa-3691 - | |
References | () http://www.openwall.com/lists/oss-security/2016/10/05/15 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/95336 - Third Party Advisory, VDB Entry | |
References | () https://bugs.ghostscript.com/show_bug.cgi?id=697179 - Issue Tracking, Patch | |
References | () https://security.gentoo.org/glsa/201702-31 - |
Information
Published : 2017-05-23 04:29
Updated : 2024-11-21 02:58
NVD link : CVE-2016-7978
Mitre link : CVE-2016-7978
CVE.ORG link : CVE-2016-7978
JSON object : View
Products Affected
artifex
- ghostscript
CWE
CWE-416
Use After Free