First published: Thu Apr 16 2009(Updated: )
Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex Ghostscript | =8.60 | |
Artifex Ghostscript | =7.07 | |
Artifex Ghostscript | =0 | |
Artifex Ghostscript | =8.62 | |
Artifex Ghostscript | =8.57 | |
Artifex Ghostscript | =8.54 | |
Artifex Ghostscript | <=8.64 | |
Artifex Ghostscript | =5.50 | |
Artifex Ghostscript | =8.15 | |
Artifex Ghostscript | =8.56 | |
Artifex Ghostscript | =8.15.2 | |
Artifex Ghostscript | =8.0.1 | |
Artifex Ghostscript | =8.61 | |
Artifex Ghostscript | =8.63 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0196 is considered critical due to its potential for remote attackers to execute arbitrary code.
To fix CVE-2009-0196, upgrade Ghostscript to a version later than 8.64 that addresses this vulnerability.
CVE-2009-0196 affects Ghostscript versions up to and including 8.64.
CVE-2009-0196 allows remote code execution through specially crafted PDF files containing a JBIG2 symbol dictionary.
Yes, CVE-2009-0196 is a documented vulnerability identified in 2009 within the Ghostscript JBIG2 decoding library.