First published: Mon Apr 03 2017(Updated: )
The fill_threshhold_buffer function in base/gxht_thresh.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/ghostscript | <9.21~dfsg+1-0ubuntu3.1 | 9.21~dfsg+1-0ubuntu3.1 |
ubuntu/ghostscript | <9.22~dfsg+1-0ubuntu1.1 | 9.22~dfsg+1-0ubuntu1.1 |
ubuntu/ghostscript | <9.10~dfsg-0ubuntu10.12 | 9.10~dfsg-0ubuntu10.12 |
ubuntu/ghostscript | <9.18~dfsg~0-0ubuntu2.8 | 9.18~dfsg~0-0ubuntu2.8 |
debian/ghostscript | 9.53.3~dfsg-7+deb11u7 10.0.0~dfsg-11+deb12u4 10.03.1~dfsg-2 | |
Artifex Software Ghostscript | =9.20 |
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=362ec9daadb9992b0def3520cd1dc6fa52edd1c4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10317 has a severity level that can lead to denial of service due to a heap-based buffer overflow.
To remediate CVE-2016-10317, update Ghostscript to versions 9.21 or higher as outlined in the vulnerability report.
CVE-2016-10317 affects Ghostscript version 9.20 and earlier on various Ubuntu and Debian systems.
CVE-2016-10317 allows remote attackers to execute denial of service attacks through crafted PostScript documents.
Current systems using outdated versions of Ghostscript are at risk for exploitation through CVE-2016-10317.