383
VMScore

CVE-2016-9601

Published: 24/04/2018 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.

Vulnerable Product Search on Vulmon Subscribe to Product

artifex gpl ghostscript

debian debian linux 8.0

debian debian linux 9.0

artifex jbig2dec

Vendor Advisories

Debian Bug report logs - #850497 jbig2dec: CVE-2016-9601: Heap-buffer overflow due to Integer overflow in jbig2_image_new function Package: src:jbig2dec; Maintainer for src:jbig2dec is Debian Printing Team <debian-printing@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 7 Jan 2017 ...
Several security issues were fixed in jbig2dec ...
Multiple security issues have been found in the JBIG2 decoder library, which may lead to lead to denial of service or the execution of arbitrary code if a malformed image file (usually embedded in a PDF document) is opened For the stable distribution (jessie), this problem has been fixed in version 013-4~deb8u1 For the upcoming stable distributi ...