First published: Wed Oct 12 2016(Updated: )
If you call .sethalftone5 with an empty operand stack, ghostscript crashes. This flaw could be exploitable Upstream bug : - <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED WONTFIX - [abrt] ease-0.4-1.fc14: memcpy: Process /usr/bin/ease was killed by signal 11 (SIGSEGV)" href="show_bug.cgi?id=697203">Bug 697203</a> - NULL dereference in .sethalftone5 <a href="http://bugs.ghostscript.com/show_bug.cgi?id=697203">http://bugs.ghostscript.com/show_bug.cgi?id=697203</a> Upstream patch : - <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED WONTFIX - [abrt] ease-0.4-1.fc14: memcpy: Process /usr/bin/ease was killed by signal 11 (SIGSEGV)" href="show_bug.cgi?id=697203">Bug 697203</a>: check for sufficient params in .sethalftone5 <a href="http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=f5c7555c303">http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=f5c7555c303</a> Reference : <a href="http://seclists.org/oss-sec/2016/q4/98">http://seclists.org/oss-sec/2016/q4/98</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex Ghostscript | <=9.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.