Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-0196

Опубликовано: 08 апр. 2009
Источник: redhat
CVSS2: 6.8
EPSS Средний

Описание

Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=493379ghostscript: Missing boundary check in Ghostscript's jbig2dec library

EPSS

Процентиль: 93%
0.12164
Средний

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
около 16 лет назад

Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.

nvd
около 16 лет назад

Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.

debian
около 16 лет назад

Heap-based buffer overflow in the big2_decode_symbol_dict function (jb ...

github
около 3 лет назад

Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.

oracle-oval
около 16 лет назад

ELSA-2009-0421: ghostscript security update (MODERATE)

EPSS

Процентиль: 93%
0.12164
Средний

6.8 Medium

CVSS2