The xps_select_font_encoding function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document, related to the xps_encode_font_char_imp function.
References
Link | Resource |
---|---|
https://bugs.ghostscript.com/show_bug.cgi?id=698050 | Exploit Issue Tracking Third Party Advisory |
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3ee55637480d5e319a5de0481b01c3346855cbc9 | Third Party Advisory |
http://www.securityfocus.com/bid/99990 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201811-12 | Third Party Advisory |
Configurations
Information
Published : 2017-07-26 12:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-9620
Mitre link : CVE-2017-9620
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
artifex
- ghostscript_ghostxps