CPANSA-Win32-Printer-2016-9601-jquery: Win32-Printer vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2018-04-24T00:00:00 Engine CSAF Perl Toolkit 0.26
Current release date 2018-04-24T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score 5.3 Severity Medium
Original language Language en
Also referred to

Vulnerability Description

ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.

Vulnerabilities

CVE-2016-9601

Vulnerability Description

ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.

Weakness CWE-190 : Integer Overflow or Wraparound

Product status

Known affected
Product Score
Win32-Printer greater than or equal 0.7.0 and less than 0.9.0
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
3.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L 5.3 Medium
2.0 AV:N/AC:M/Au:N/C:N/I:N/A:P 4.3 Medium

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Tue Apr 24 00:00:00 2018 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/