cve/2016/CVE-2016-9601.md

18 lines
832 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2016-9601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9601)
![](https://img.shields.io/static/v1?label=Product&message=ghostscript&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190-%3ECWE-122&color=brighgreen)
### Description
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
### POC
#### Reference
- https://bugs.ghostscript.com/show_bug.cgi?id=697457
#### Github
No PoCs found on GitHub currently.