The PS Interpreter in Ghostscript 9.18 and 9.20 allows remote attackers to execute arbitrary code via crafted userparams.
References
Link | Resource |
---|---|
https://bugs.ghostscript.com/show_bug.cgi?id=697178 | Issue Tracking Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/10/19/6 | Mailing List Third Party Advisory |
http://git.ghostscript.com/?p=user/chrisl/ghostpdl.git;a=commit;h=6d444c273da5499a4cd72f21cb6d4c9a5256807d | Third Party Advisory |
https://security.gentoo.org/glsa/201702-31 | Third Party Advisory |
http://www.securityfocus.com/bid/95332 | Third Party Advisory VDB Entry |
http://www.debian.org/security/2016/dsa-3691 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-08-07 13:29
Updated : 2017-11-03 18:29
NVD link : CVE-2016-7976
Mitre link : CVE-2016-7976
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
artifex
- ghostscript