First published: Tue May 23 2017(Updated: )
Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initialize_dsc_parser.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex Software Ghostscript | <=9.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7979 is rated as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2016-7979, upgrade to Ghostscript version 9.21 or later.
CVE-2016-7979 affects all versions of Ghostscript up to and including 9.20.
CVE-2016-7979 allows remote attackers to execute arbitrary code by bypassing the SAFER mode protection.
CVE-2016-7979 involves type confusion in the .initialize_dsc_parser component of Ghostscript.