CVE-2018-6191

The js_strtod function in jsdtoa.c in Artifex MuJS through 1.0.2 has an integer overflow because of incorrect exponent validation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:artifex:mujs:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:10

Type Values Removed Values Added
References () http://git.ghostscript.com/?p=mujs.git%3Ba=commit%3Bh=25821e6d74fab5fcc200fe5e818362e03e114428 - () http://git.ghostscript.com/?p=mujs.git%3Ba=commit%3Bh=25821e6d74fab5fcc200fe5e818362e03e114428 -
References () http://www.securityfocus.com/bid/102840 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/102840 - Third Party Advisory, VDB Entry
References () https://bugs.ghostscript.com/show_bug.cgi?id=698920 - Permissions Required () https://bugs.ghostscript.com/show_bug.cgi?id=698920 - Permissions Required
References () https://www.exploit-db.com/exploits/43903/ - Exploit, Patch, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/43903/ - Exploit, Patch, Third Party Advisory, VDB Entry

07 Nov 2023, 02:59

Type Values Removed Values Added
References
  • {'url': 'http://git.ghostscript.com/?p=mujs.git;a=commit;h=25821e6d74fab5fcc200fe5e818362e03e114428', 'name': 'http://git.ghostscript.com/?p=mujs.git;a=commit;h=25821e6d74fab5fcc200fe5e818362e03e114428', 'tags': ['Patch', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () http://git.ghostscript.com/?p=mujs.git%3Ba=commit%3Bh=25821e6d74fab5fcc200fe5e818362e03e114428 -

Information

Published : 2018-01-24 21:29

Updated : 2024-11-21 04:10


NVD link : CVE-2018-6191

Mitre link : CVE-2018-6191

CVE.ORG link : CVE-2018-6191


JSON object : View

Products Affected

artifex

  • mujs
CWE
CWE-190

Integer Overflow or Wraparound