Secunia Research has discovered a vulnerability in Ghostscript, which can be exploited by malicious people to potentially compromise a user’s system. The vulnerability is caused due to a boundary error in the included jbig2dec library while decoding JBIG2 symbol dictionary segments. This can be exploited to cause a heap-based buffer overflow via a specially crafted PDF file. Successful exploitation may allow execution of arbitrary code. Ghostscript version 8.64 is affected.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/76512/secunia-ghostscript.txt
Source: https://packetstormsecurity.com/files/76512/Ghostscript-jbig2dec-JBIG2-Processing-Buffer-Overflow.html

