The xps_select_font_encoding function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document, related to the xps_encode_font_char_imp function.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugs.ghostscript.com/show_bug.cgi?id=698050 | Exploit Issue Tracking Third Party Advisory | 
| http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3ee55637480d5e319a5de0481b01c3346855cbc9 | Third Party Advisory | 
| http://www.securityfocus.com/bid/99990 | Third Party Advisory VDB Entry | 
| https://security.gentoo.org/glsa/201811-12 | Third Party Advisory | 
Configurations
                    Information
                Published : 2017-07-26 12:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-9620
Mitre link : CVE-2017-9620
JSON object : View
CWE
                
                    
                        
                        CWE-125
                        
            Out-of-bounds Read
Products Affected
                artifex
- ghostscript_ghostxps
 


