CVE-2017-5627
https://notcve.org/view.php?id=CVE-2017-5627
An issue was discovered in Artifex Software, Inc. MuJS before 4006739a28367c708dea19aeb19b8a1a9326ce08. The jsR_setproperty function in jsrun.c lacks a check for a negative array length. This leads to an integer overflow in the js_pushstring function in jsrun.c when parsing a specially crafted JS file. Se ha descubierto un problema en Artifex Software, Inc. • http://git.ghostscript.com/?p=mujs.git%3Bh=4006739a28367c708dea19aeb19b8a1a9326ce08 http://www.securityfocus.com/bid/95856 https://bugs.ghostscript.com/show_bug.cgi?id=697497 • CWE-190: Integer Overflow or Wraparound •
CVE-2017-5628
https://notcve.org/view.php?id=CVE-2017-5628
An issue was discovered in Artifex Software, Inc. MuJS before 8f62ea10a0af68e56d5c00720523ebcba13c2e6a. The MakeDay function in jsdate.c does not validate the month, leading to an integer overflow when parsing a specially crafted JS file. Vulnerabilidad en el componente Oracle One-to-One Fulfillment de Oracle E-Business Suite (subcomponente: User Interface). Versiones compatibles que están afectadas son 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 y 12.2.6. • http://git.ghostscript.com/?p=mujs.git%3Bh=8f62ea10a0af68e56d5c00720523ebcba13c2e6a http://www.securityfocus.com/bid/95855 https://bugs.ghostscript.com/show_bug.cgi?id=697496 • CWE-190: Integer Overflow or Wraparound •
CVE-2016-10141
https://notcve.org/view.php?id=CVE-2016-10141
An integer overflow vulnerability was observed in the regemit function in regexp.c in Artifex Software, Inc. MuJS before fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045. The attack requires a regular expression with nested repetition. A successful exploitation of this issue can lead to code execution or a denial of service (buffer overflow) condition. Se observó una vulnerabilidad de desbordamiento de enteros en la función regemit en regexp.c en Artifex Software, Inc. • http://git.ghostscript.com/?p=mujs.git%3Bh=fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045 http://www.securityfocus.com/bid/95876 https://bugs.ghostscript.com/show_bug.cgi?id=697448 • CWE-190: Integer Overflow or Wraparound •
CVE-2016-9294
https://notcve.org/view.php?id=CVE-2016-9294
Artifex Software, Inc. MuJS before 5008105780c0b0182ea6eda83ad5598f225be3ee allows context-dependent attackers to conduct "denial of service (application crash)" attacks by using the "malformed labeled break/continue in JavaScript" approach, related to a "NULL pointer dereference" issue affecting the jscompile.c component. Artifex Software, Inc. MuJS en versiones anteriores a 5008105780c0b0182ea6eda83ad5598f225be3ee permite a atacantes dependientes del contexto llevar a cabo ataques de "denegación de servicio (caída de aplicación)" utilizando el enfoque "etiquetado mal formado pausa/continuación en JavaScript", relacionado con un problema "referencia al puntero NULL" que afecta al componente jscompile.c. • http://bugs.ghostscript.com/show_bug.cgi?id=697172 http://git.ghostscript.com/?p=mujs.git%3Ba=commit%3Bh=5008105780c0b0182ea6eda83ad5598f225be3ee http://www.securityfocus.com/bid/94293 • CWE-476: NULL Pointer Dereference •
CVE-2016-9136
https://notcve.org/view.php?id=CVE-2016-9136
Artifex Software, Inc. MuJS before a0ceaf5050faf419401fe1b83acfa950ec8a8a89 allows context-dependent attackers to obtain sensitive information by using the "crafted JavaScript" approach, related to a "Buffer Over-read" issue. Artifex Software, Inc. MuJS en versiones anteriores a a0ceaf5050faf419401fe1b83acfa950ec8a8a89 permite a atacantes dependientes de contexto obtener información sensible usando la aproximación "JavaScript manipulada", relacionado con un problema "Buffer Over-read". • http://bugs.ghostscript.com/show_bug.cgi?id=697244 http://www.securityfocus.com/bid/94223 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •