Vulnerability Details : CVE-2009-0196
Potential exploit
Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.
Vulnerability category: OverflowExecute code
Products affected by CVE-2009-0196
- cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.60:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.61:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:0:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.62:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.63:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.15.2:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.56:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.54:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.57:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:5.50:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:7.07:*:*:*:*:*:*:*
*Version "0" is used as a placeholder when we don't have exact version information.
Exploit prediction scoring system (EPSS) score for CVE-2009-0196
8.54%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-0196
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2009-0196
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-0196
-
http://www.securityfocus.com/archive/1/502586/100/0/threaded
-
http://www.securityfocus.com/archive/1/502757/100/0/threaded
-
http://www.securityfocus.com/bid/34445
Patch
-
https://bugzilla.redhat.com/attachment.cgi?id=337747
Exploit
-
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2009:011 - openSUSE Security Announce - openSUSE Mailing Lists
-
http://www.vupen.com/english/advisories/2009/0983
Site en constructionVendor Advisory
-
http://www.vupen.com/english/advisories/2009/1708
Site en construction
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10533
404 Not Found
-
https://usn.ubuntu.com/757-1/
404: Page not found | Ubuntu
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1
-
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00460.html
[SECURITY] Fedora 10 Update: ghostscript-8.63-6.fc10
-
http://www.securitytracker.com/id?1022029
GoDaddy Domain Name Search
-
http://www.redhat.com/support/errata/RHSA-2009-0421.html
Support
-
http://wiki.rpath.com/Advisories:rPSA-2009-0060
-
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00461.html
[SECURITY] Fedora 9 Update: ghostscript-8.63-3.fc9
-
http://security.gentoo.org/glsa/glsa-201412-17.xml
GPL Ghostscript: Multiple vulnerabilities (GLSA 201412-17) — Gentoo security
-
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2009:009 - openSUSE Security Announce - openSUSE Mailing Lists
-
http://www.mandriva.com/security/advisories?name=MDVSA-2009:095
Mandriva
Jump to