Get a Pentest and security assessment of your IT network.

Advisories

Ghostscript jbig2dec JBIG2 Processing Buffer Overflow

Secunia Research has discovered a vulnerability in Ghostscript, which can be exploited by malicious people to potentially compromise a user’s system. The vulnerability is caused due to a boundary error in the included jbig2dec library while decoding JBIG2 symbol dictionary segments. This can be exploited to cause a heap-based buffer overflow via a specially crafted PDF file. Successful exploitation may allow execution of arbitrary code. Ghostscript version 8.64 is affected.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/76512/secunia-ghostscript.txt

Source: https://packetstormsecurity.com/files/76512/Ghostscript-jbig2dec-JBIG2-Processing-Buffer-Overflow.html

Related posts
Advisories

crossZone.txt

Advisories

Secunia Security Advisory 16900

Advisories

Secunia Security Advisory 19793

Advisories

Secunia Security Advisory 22534