Files
CVEs-PoC/2016/CVE-2016-9601.md
T
2025-09-29 21:09:30 +02:00

18 lines
856 B
Markdown

### [CVE-2016-9601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9601)
![](https://img.shields.io/static/v1?label=Product&message=ghostscript&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=ghostscript%200.14%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190-%3ECWE-122&color=brightgreen)
### Description
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
### POC
#### Reference
- https://bugs.ghostscript.com/show_bug.cgi?id=697457
#### Github
No PoCs found on GitHub currently.