ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-874-1 | jbig2dec security update |
![]() |
DSA-3817-1 | jbig2dec security update |
![]() |
EUVD-2016-10405 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript. |
![]() |
USN-3297-1 | jbig2dec vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T02:59:02.237Z
Reserved: 2016-11-23T00:00:00
Link: CVE-2016-9601

No data.

Status : Modified
Published: 2018-04-24T01:29:00.270
Modified: 2024-11-21T03:01:29.390
Link: CVE-2016-9601


No data.