[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2009-0196

Date: (C)2009-04-16   (M)2017-11-18 


Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.

CVSS Score: 9.3Access Vector: NETWORK
Exploit Score: 8.6Access Complexity: MEDIUM
Impact Score: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE





Reference:
SECTRACK-1022029
http://www.securityfocus.com/archive/1/archive/1/502586/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/502757/100/0/threaded
SUNALERT-262288
SECUNIA-34292
BID-34445
SECUNIA-34667
SECUNIA-34729
SECUNIA-34732
SECUNIA-35416
SECUNIA-35559
SECUNIA-35569
OSVDB-53492
ADV-2009-0983
ADV-2009-1708
FEDORA-2009-3709
FEDORA-2009-3710
GLSA-201412-17
MDVSA-2009:095
RHSA-2009:0421
SUSE-SR:2009:009
SUSE-SR:2009:011
USN-757-1
http://secunia.com/secunia_research/2009-21/
http://wiki.rpath.com/Advisories:rPSA-2009-0060
https://bugzilla.redhat.com/attachment.cgi?id=337747

CWE    1
CWE-119
OVAL    9
oval:org.secpod.oval:def:300532
oval:org.secpod.oval:def:300723
oval:org.secpod.oval:def:500640
oval:org.secpod.oval:def:202116
...

© 2013 SecPod Technologies