The PS Interpreter in Ghostscript 9.18 and 9.20 allows remote attackers to execute arbitrary code via crafted userparams.
References
Link | Resource |
---|---|
http://git.ghostscript.com/?p=user/chrisl/ghostpdl.git%3Ba=commit%3Bh=6d444c273da5499a4cd72f21cb6d4c9a5256807d | |
http://www.debian.org/security/2016/dsa-3691 | |
http://www.openwall.com/lists/oss-security/2016/10/19/6 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/95332 | Third Party Advisory VDB Entry |
https://bugs.ghostscript.com/show_bug.cgi?id=697178 | Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/201702-31 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-08-07 20:29
Updated : 2024-02-04 19:29
NVD link : CVE-2016-7976
Mitre link : CVE-2016-7976
CVE.ORG link : CVE-2016-7976
JSON object : View
Products Affected
artifex
- ghostscript
CWE
CWE-20
Improper Input Validation