Filtered by vendor Artifex
Subscribe
Total
198 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-19134 | 3 Artifex, Debian, Redhat | 7 Ghostscript, Debian Linux, Enterprise Linux Desktop and 4 more | 2019-01-11 | 6.8 MEDIUM | 7.8 HIGH |
In Artifex Ghostscript through 9.25, the setpattern operator did not properly validate certain types. A specially crafted PostScript document could exploit this to crash Ghostscript or, possibly, execute arbitrary code in the context of the Ghostscript process. This is a type confusion issue because of failure to check whether the Implementation of a pattern dictionary was a structure type. | |||||
CVE-2018-19478 | 2 Artifex, Debian | 2 Ghostscript, Debian Linux | 2019-01-11 | 4.3 MEDIUM | 5.5 MEDIUM |
In Artifex Ghostscript before 9.26, a carefully crafted PDF file can trigger an extremely long running computation when parsing the file. | |||||
CVE-2017-15587 | 1 Artifex | 1 Mupdf | 2018-11-27 | 6.8 MEDIUM | 7.8 HIGH |
An integer overflow was discovered in pdf_read_new_xref_section in pdf/pdf-xref.c in Artifex MuPDF 1.11. | |||||
CVE-2017-17858 | 1 Artifex | 1 Mupdf | 2018-11-27 | 6.8 MEDIUM | 7.8 HIGH |
Heap-based buffer overflow in the ensure_solid_xref function in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 allows a remote attacker to potentially execute arbitrary code via a crafted PDF file, because xref subsection object numbers are unrestricted. | |||||
CVE-2018-11645 | 1 Artifex | 1 Ghostscript | 2018-11-11 | 5.0 MEDIUM | 5.3 MEDIUM |
psi/zfile.c in Artifex Ghostscript before 9.21rc1 permits the status command even if -dSAFER is used, which might allow remote attackers to determine the existence and size of arbitrary files, a similar issue to CVE-2016-7977. | |||||
CVE-2016-6265 | 2 Artifex, Opensuse | 3 Mupdf, Leap, Opensuse | 2018-10-30 | 4.3 MEDIUM | 5.5 MEDIUM |
Use-after-free vulnerability in the pdf_load_xref function in pdf/pdf-xref.c in MuPDF allows remote attackers to cause a denial of service (crash) via a crafted PDF file. | |||||
CVE-2010-1869 | 1 Artifex | 1 Gpl Ghostscript | 2018-10-10 | 9.3 HIGH | N/A |
Stack-based buffer overflow in the parser function in GhostScript 8.70 and 8.64 allows context-dependent attackers to execute arbitrary code via a crafted PostScript file. | |||||
CVE-2010-1628 | 1 Artifex | 1 Gpl Ghostscript | 2018-10-10 | 9.3 HIGH | N/A |
Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter. | |||||
CVE-2009-3743 | 1 Artifex | 3 Afpl Ghostscript, Ghostscript Fonts, Gpl Ghostscript | 2018-10-10 | 9.3 HIGH | N/A |
Off-by-one error in the Ins_MINDEX function in the TrueType bytecode interpreter in Ghostscript before 8.71 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a malformed TrueType font in a document that trigger an integer overflow and a heap-based buffer overflow. | |||||
CVE-2016-10317 | 1 Artifex | 1 Ghostscript | 2018-05-01 | 6.8 MEDIUM | 7.8 HIGH |
The fill_threshhold_buffer function in base/gxht_thresh.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document. | |||||
CVE-2018-6191 | 1 Artifex | 1 Mujs | 2018-02-09 | 4.3 MEDIUM | 5.5 MEDIUM |
The js_strtod function in jsdtoa.c in Artifex MuJS through 1.0.2 has an integer overflow because of incorrect exponent validation. | |||||
CVE-2017-14687 | 2 Artifex, Microsoft | 2 Mupdf, Windows | 2018-02-03 | 6.8 MEDIUM | 7.8 HIGH |
Artifex MuPDF 1.11 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .xps file, related to "Data from Faulting Address controls Branch Selection starting at mupdf+0x000000000016cb4f" on Windows. This occurs because of mishandling of XML tag name comparisons. | |||||
CVE-2016-7977 | 1 Artifex | 1 Ghostscript | 2018-01-18 | 4.3 MEDIUM | 5.5 MEDIUM |
Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document. | |||||
CVE-2017-7207 | 1 Artifex | 1 Ghostscript | 2018-01-04 | 4.3 MEDIUM | 5.5 MEDIUM |
The mem_get_bits_rectangle function in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document. | |||||
CVE-2017-8291 | 1 Artifex | 1 Ghostscript | 2018-01-04 | 6.8 MEDIUM | 7.8 HIGH |
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017. | |||||
CVE-2016-8602 | 1 Artifex | 1 Ghostscript | 2018-01-04 | 6.8 MEDIUM | 7.8 HIGH |
The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Postscript document that calls .sethalftone5 with an empty operand stack. | |||||
CVE-2016-7979 | 1 Artifex | 1 Ghostscript | 2018-01-04 | 7.5 HIGH | 9.8 CRITICAL |
Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initialize_dsc_parser. | |||||
CVE-2016-7978 | 1 Artifex | 1 Ghostscript | 2018-01-04 | 7.5 HIGH | 9.8 CRITICAL |
Use-after-free vulnerability in Ghostscript 9.20 might allow remote attackers to execute arbitrary code via vectors related to a reference leak in .setdevice. | |||||
CVE-2013-5653 | 2 Artifex, Debian | 2 Afpl Ghostscript, Debian Linux | 2018-01-04 | 4.3 MEDIUM | 5.5 MEDIUM |
The getenv and filenameforall functions in Ghostscript 9.10 ignore the "-dSAFER" argument, which allows remote attackers to read data via a crafted postscript file. | |||||
CVE-2013-6629 | 3 Artifex, Google, Oracle | 3 Gpl Ghostscript, Chrome, Solaris | 2018-01-04 | 5.0 MEDIUM | N/A |
The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image. |