First published: Sat Oct 29 2016(Updated: )
A use-after-free vulnerability was observed in Rp_toString function of Artifex Software, Inc. MuJS before 5c337af4b3df80cf967e4f9f6a21522de84b392a. A successful exploitation of this issue can lead to code execution or denial of service condition.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex MuJS | <=5000749f5afe3b956fc916e407309de840997f4a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7504 has a high severity due to its potential for code execution and denial of service.
The best way to fix CVE-2016-7504 is to update to the version of MuJS that addresses this vulnerability after 5000749f5afe3b956fc916e407309de840997f4a.
CVE-2016-7504 affects all versions of MuJS prior to 5000749f5afe3b956fc916e407309de840997f4a.
Yes, CVE-2016-7504 can potentially be exploited remotely if the vulnerable MuJS version is accessible over a network.
Exploiting CVE-2016-7504 can lead to arbitrary code execution or a denial of service condition.