An exploitable heap-based buffer overflow exists in Iceni Argus. When it attempts to convert a malformed PDF with an object encoded w/ multiple encoding types terminating with an LZW encoded type, an overflow may occur due to a lack of bounds checking by the LZW decoder. This can lead to code execution under the context of the account of the user running it.
Advisories
Source ID Title
EUVD EUVD EUVD-2016-9235 An exploitable heap-based buffer overflow exists in Iceni Argus. When it attempts to convert a malformed PDF with an object encoded w/ multiple encoding types terminating with an LZW encoded type, an overflow may occur due to a lack of bounds checking by the LZW decoder. This can lead to code execution under the context of the account of the user running it.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-08-06T02:20:31.165Z

Reserved: 2016-09-29T00:00:00

Link: CVE-2016-8387

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-02-27T21:59:00.223

Modified: 2025-04-20T01:37:25.860

Link: CVE-2016-8387

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.