### [CVE-2016-9601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9601) ![](https://img.shields.io/static/v1?label=Product&message=ghostscript&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190-%3ECWE-122&color=brighgreen) ### Description ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript. ### POC #### Reference - https://bugs.ghostscript.com/show_bug.cgi?id=697457 #### Github No PoCs found on GitHub currently.