The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
References
Link | Resource |
---|---|
http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=961b10cdd71403072fb99401a45f3bef6ce53626 | |
http://www.securityfocus.com/bid/99983 | Third Party Advisory VDB Entry |
https://bugs.ghostscript.com/show_bug.cgi?id=698064 | Exploit Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/201811-12 | Third Party Advisory |
http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=961b10cdd71403072fb99401a45f3bef6ce53626 | |
http://www.securityfocus.com/bid/99983 | Third Party Advisory VDB Entry |
https://bugs.ghostscript.com/show_bug.cgi?id=698064 | Exploit Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/201811-12 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=961b10cdd71403072fb99401a45f3bef6ce53626 - | |
References | () http://www.securityfocus.com/bid/99983 - Third Party Advisory, VDB Entry | |
References | () https://bugs.ghostscript.com/show_bug.cgi?id=698064 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201811-12 - Third Party Advisory |
Information
Published : 2017-07-26 19:29
Updated : 2024-11-21 03:36
NVD link : CVE-2017-9740
Mitre link : CVE-2017-9740
CVE.ORG link : CVE-2017-9740
JSON object : View
Products Affected
artifex
- ghostscript_ghostxps
CWE
CWE-125
Out-of-bounds Read