Artifex Software, Inc. MuJS before a5c747f1d40e8d6659a37a8d25f13fb5acf8e767 allows context-dependent attackers to obtain sensitive information by using the "opname in crafted JavaScript file" approach, related to an "Out-of-Bounds read" issue affecting the jsC_dumpfunction function in the jsdump.c component.
References
Link | Resource |
---|---|
http://bugs.ghostscript.com/show_bug.cgi?id=697171 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/94241 | Third Party Advisory VDB Entry |
http://bugs.ghostscript.com/show_bug.cgi?id=697171 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/94241 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.ghostscript.com/show_bug.cgi?id=697171 - Exploit, Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/94241 - Third Party Advisory, VDB Entry |
Information
Published : 2016-10-28 15:59
Updated : 2024-11-21 03:00
NVD link : CVE-2016-9017
Mitre link : CVE-2016-9017
CVE.ORG link : CVE-2016-9017
JSON object : View
Products Affected
artifex
- mujs