First published: Fri Jul 28 2017(Updated: )
psi/ztoken.c in Artifex Ghostscript 9.21 mishandles references to the scanner state structure, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document, related to an out-of-bounds read in the igc_reloc_struct_ptr function in psi/igc.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex Software Ghostscript | =9.21 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=671fd59eb657743aa86fbc1895cb15872a317caa
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11714 has a moderate severity level due to its potential to cause denial of service.
To fix CVE-2017-11714, update to Ghostscript version 9.22 or later, which includes the necessary patches.
CVE-2017-11714 affects Artifex Ghostscript version 9.21, as well as Debian Linux versions 8.0 and 9.0.
CVE-2017-11714 allows remote attackers to cause application crashes through crafted PostScript documents.
Yes, CVE-2017-11714 can be exploited by unauthenticated users who can submit crafted PostScript documents.