CVE-2016-9017

Artifex Software, Inc. MuJS before a5c747f1d40e8d6659a37a8d25f13fb5acf8e767 allows context-dependent attackers to obtain sensitive information by using the "opname in crafted JavaScript file" approach, related to an "Out-of-Bounds read" issue affecting the jsC_dumpfunction function in the jsdump.c component.
References
Link Resource
http://bugs.ghostscript.com/show_bug.cgi?id=697171 Exploit Patch Vendor Advisory
http://www.securityfocus.com/bid/94241 Third Party Advisory VDB Entry
http://bugs.ghostscript.com/show_bug.cgi?id=697171 Exploit Patch Vendor Advisory
http://www.securityfocus.com/bid/94241 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:artifex:mujs:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:00

Type Values Removed Values Added
References () http://bugs.ghostscript.com/show_bug.cgi?id=697171 - Exploit, Patch, Vendor Advisory () http://bugs.ghostscript.com/show_bug.cgi?id=697171 - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/94241 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94241 - Third Party Advisory, VDB Entry

Information

Published : 2016-10-28 15:59

Updated : 2024-11-21 03:00


NVD link : CVE-2016-9017

Mitre link : CVE-2016-9017

CVE.ORG link : CVE-2016-9017


JSON object : View

Products Affected

artifex

  • mujs
CWE
CWE-125

Out-of-bounds Read

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor