First published: Wed Jan 18 2017(Updated: )
Heap-based buffer overflow in the Fp_toString function in jsfunction.c in Artifex Software MuJS allows attackers to cause a denial of service (crash) via crafted input.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MuJS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7564 has a severity rating that can potentially lead to denial of service.
To fix CVE-2016-7564, you should update to a version of Artifex MuJS that addresses the vulnerability.
The vulnerability in CVE-2016-7564 is caused by a heap-based buffer overflow in the Fp_toString function.
CVE-2016-7564 can lead to a denial of service, potentially crashing applications that utilize Artifex MuJS.
CVE-2016-7564 affects all versions of Artifex MuJS prior to the patched release.