Description
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-874-1 | jbig2dec security update |
Debian DSA |
DSA-3817-1 | jbig2dec security update |
EUVD |
EUVD-2016-10405 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript. |
Ubuntu USN |
USN-3297-1 | jbig2dec vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T02:59:02.237Z
Reserved: 2016-11-23T00:00:00.000Z
Link: CVE-2016-9601
No data.
Status : Modified
Published: 2018-04-24T01:29:00.270
Modified: 2024-11-21T03:01:29.390
Link: CVE-2016-9601
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN