First published: Mon Apr 23 2018(Updated: )
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/jbig2dec | 0.16-1+deb10u1 0.19-2 0.19-3 | |
Artifex Gpl Ghostscript | <9.21 | |
Artifex Jbig2dec | <=0.13 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9601 is a vulnerability in ghostscript before version 9.21 that allows a heap based buffer overflow in the jbig2_decode_gray_scale_image function.
The severity of CVE-2016-9601 is medium with a CVSS score of 5.5.
The affected software versions are: jbig2dec 0.16-1+deb10u1, 0.19-2, 0.19-3, Artifex Gpl Ghostscript up to version 9.21, and Artifex Jbig2dec up to version 0.13.
To fix CVE-2016-9601, update to the latest version of ghostscript if available, or apply the necessary patches provided by the vendor.
You can find more information about CVE-2016-9601 at the following references: [1] [2] [3].