CVE-2016-9601

ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
Configurations

Configuration 1 (hide)

cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:artifex:jbig2dec:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:01

Type Values Removed Values Added
References () http://git.ghostscript.com/?p=jbig2dec.git%3Ba=commit%3Bh=e698d5c11d27212aa1098bc5b1673a3378563092 - () http://git.ghostscript.com/?p=jbig2dec.git%3Ba=commit%3Bh=e698d5c11d27212aa1098bc5b1673a3378563092 -
References () http://www.securityfocus.com/bid/97095 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/97095 - Third Party Advisory, VDB Entry
References () https://bugs.ghostscript.com/show_bug.cgi?id=697457 - Issue Tracking, Third Party Advisory () https://bugs.ghostscript.com/show_bug.cgi?id=697457 - Issue Tracking, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9601 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9601 - Issue Tracking, Third Party Advisory
References () https://security.gentoo.org/glsa/201706-24 - Third Party Advisory () https://security.gentoo.org/glsa/201706-24 - Third Party Advisory
References () https://www.debian.org/security/2017/dsa-3817 - Third Party Advisory () https://www.debian.org/security/2017/dsa-3817 - Third Party Advisory
CVSS v2 : 4.3
v3 : 5.5
v2 : 4.3
v3 : 5.3

07 Nov 2023, 02:37

Type Values Removed Values Added
References
  • {'url': 'http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092', 'name': 'http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092', 'tags': ['Third Party Advisory'], 'refsource': 'CONFIRM'}
  • () http://git.ghostscript.com/?p=jbig2dec.git%3Ba=commit%3Bh=e698d5c11d27212aa1098bc5b1673a3378563092 -

Information

Published : 2018-04-24 01:29

Updated : 2024-11-21 03:01


NVD link : CVE-2016-9601

Mitre link : CVE-2016-9601

CVE.ORG link : CVE-2016-9601


JSON object : View

Products Affected

debian

  • debian_linux

artifex

  • jbig2dec
  • gpl_ghostscript
CWE
CWE-190

Integer Overflow or Wraparound

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer