First published: Thu Apr 16 2009(Updated: )
Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ghostscript Ghostscript | =8.60 | |
Ghostscript Ghostscript | =7.07 | |
Ghostscript Ghostscript | =0 | |
Ghostscript Ghostscript | =8.62 | |
Ghostscript Ghostscript | =8.57 | |
Ghostscript Ghostscript | =8.54 | |
Ghostscript Ghostscript | <=8.64 | |
Ghostscript Ghostscript | =5.50 | |
Ghostscript Ghostscript | =8.15 | |
Ghostscript Ghostscript | =8.56 | |
Ghostscript Ghostscript | =8.15.2 | |
Ghostscript Ghostscript | =8.0.1 | |
Ghostscript Ghostscript | =8.61 | |
Ghostscript Ghostscript | =8.63 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.