CVE-2016-10133
https://notcve.org/view.php?id=CVE-2016-10133
Heap-based buffer overflow in the js_stackoverflow function in jsrun.c in Artifex Software, Inc. MuJS allows attackers to have unspecified impact by leveraging an error when dropping extra arguments to lightweight functions. Desbordamiento de búfer basado en memoria dinámica en la función js_stackoverflow en jsrun.c en Artifex Software, Inc. MuJS permite a atacantes tener impacto no especificado aprovechando un error cuando se arrojan argumentos extra a funciones de peso ligero. • http://git.ghostscript.com/?p=mujs.git%3Ba=commit%3Bh=77ab465f1c394bb77f00966cd950650f3f53cb24 http://www.openwall.com/lists/oss-security/2017/01/12/9 http://www.openwall.com/lists/oss-security/2017/01/13/1 https://bugs.ghostscript.com/show_bug.cgi?id=697401 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3U5APFS3FEBOPXUJIFWBNU55PYR7ZBF • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2016-10132
https://notcve.org/view.php?id=CVE-2016-10132
regexp.c in Artifex Software, Inc. MuJS allows attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to regular expression compilation. regexp.c en Artifex Software, Inc. MuJS permite a atacantes provocar una denegación de servicio (referencia a puntero NULL y caída) a través de vectores relacionados con la compilación de expresiones regulares. • http://git.ghostscript.com/?p=mujs.git%3Bh=fd003eceda531e13fbdd1aeb6e9c73156496e569 http://www.openwall.com/lists/oss-security/2017/01/12/9 http://www.openwall.com/lists/oss-security/2017/01/13/1 https://bugs.ghostscript.com/show_bug.cgi?id=697381 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3U5APFS3FEBOPXUJIFWBNU55PYR7ZBF • CWE-476: NULL Pointer Dereference •
CVE-2016-9108
https://notcve.org/view.php?id=CVE-2016-9108
Integer overflow in the js_regcomp function in regexp.c in Artifex Software, Inc. MuJS before commit b6de34ac6d8bb7dd5461c57940acfbd3ee7fd93e allows attackers to cause a denial of service (application crash) via a crafted regular expression. Desbordamiento de entero en la función js_regcomp en regexp.c en Artifex Software, Inc. MuJS en versiones anteriores a commit b6de34ac6d8bb7dd5461c57940acfbd3ee7fd93e permite a atacantes provocar una denegación de servicio (caída de la aplicación) a través de una expresión regular manipulada. • http://www.openwall.com/lists/oss-security/2016/10/30/12 http://www.securityfocus.com/bid/96006 https://bugzilla.redhat.com/show_bug.cgi?id=1390266 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IMPCTUBV2UUTSKAGVAW3EL6HJJWHRZQZ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMI77FMFDWOTUUKKPTQLIB7JEXFTING4 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y4FE2LXVJM5PXHUGSFOT2KTA75O5ACV4 • CWE-190: Integer Overflow or Wraparound •
CVE-2017-5627
https://notcve.org/view.php?id=CVE-2017-5627
An issue was discovered in Artifex Software, Inc. MuJS before 4006739a28367c708dea19aeb19b8a1a9326ce08. The jsR_setproperty function in jsrun.c lacks a check for a negative array length. This leads to an integer overflow in the js_pushstring function in jsrun.c when parsing a specially crafted JS file. Se ha descubierto un problema en Artifex Software, Inc. • http://git.ghostscript.com/?p=mujs.git%3Bh=4006739a28367c708dea19aeb19b8a1a9326ce08 http://www.securityfocus.com/bid/95856 https://bugs.ghostscript.com/show_bug.cgi?id=697497 • CWE-190: Integer Overflow or Wraparound •
CVE-2017-5628
https://notcve.org/view.php?id=CVE-2017-5628
An issue was discovered in Artifex Software, Inc. MuJS before 8f62ea10a0af68e56d5c00720523ebcba13c2e6a. The MakeDay function in jsdate.c does not validate the month, leading to an integer overflow when parsing a specially crafted JS file. Vulnerabilidad en el componente Oracle One-to-One Fulfillment de Oracle E-Business Suite (subcomponente: User Interface). Versiones compatibles que están afectadas son 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 y 12.2.6. • http://git.ghostscript.com/?p=mujs.git%3Bh=8f62ea10a0af68e56d5c00720523ebcba13c2e6a http://www.securityfocus.com/bid/95855 https://bugs.ghostscript.com/show_bug.cgi?id=697496 • CWE-190: Integer Overflow or Wraparound •