CVE-2009-0196
ghostscript: Missing boundary check in Ghostscript's jbig2dec library
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.
Desbordamiento de entero en la función big2_decode_symbol_dict (jbig2_symbol_dict.c) en la librería de decodificación JBIG2 (jbig2dec) en Ghostscript 8.64 y posiblemente versiones anteriores, permite a atacantes remotos ejecutar código de su elección mediante un fichero PDF que contenga un segmento de diccionario de símbolos JBIG2 con un valor grande de longitud de repetición(run length).
Secunia Research has discovered a vulnerability in Ghostscript, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to a boundary error in the included jbig2dec library while decoding JBIG2 symbol dictionary segments. This can be exploited to cause a heap-based buffer overflow via a specially crafted PDF file. Successful exploitation may allow execution of arbitrary code. Ghostscript version 8.64 is affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-01-20 CVE Reserved
- 2009-04-09 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (29)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/34667 | Third Party Advisory | |
http://secunia.com/advisories/34729 | Third Party Advisory | |
http://secunia.com/advisories/34732 | Third Party Advisory | |
http://secunia.com/advisories/35416 | Third Party Advisory | |
http://secunia.com/advisories/35559 | Third Party Advisory | |
http://secunia.com/advisories/35569 | Third Party Advisory | |
http://wiki.rpath.com/Advisories:rPSA-2009-0060 | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/502586/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/502757/100/0/threaded | Mailing List | |
http://www.securitytracker.com/id?1022029 | Vdb Entry | |
http://www.vupen.com/english/advisories/2009/1708 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10533 | Signature |
URL | Date | SRC |
---|---|---|
http://osvdb.org/53492 | 2024-08-07 | |
https://bugzilla.redhat.com/attachment.cgi?id=337747 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/34445 | 2018-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ghostscript Search vendor "Ghostscript" | Ghostscript Search vendor "Ghostscript" for product "Ghostscript" | <= 8.64 Search vendor "Ghostscript" for product "Ghostscript" and version " <= 8.64" | - |
Affected
| ||||||
Ghostscript Search vendor "Ghostscript" | Ghostscript Search vendor "Ghostscript" for product "Ghostscript" | 0 Search vendor "Ghostscript" for product "Ghostscript" and version "0" | - |
Affected
| ||||||
Ghostscript Search vendor "Ghostscript" | Ghostscript Search vendor "Ghostscript" for product "Ghostscript" | 5.50 Search vendor "Ghostscript" for product "Ghostscript" and version "5.50" | - |
Affected
| ||||||
Ghostscript Search vendor "Ghostscript" | Ghostscript Search vendor "Ghostscript" for product "Ghostscript" | 7.07 Search vendor "Ghostscript" for product "Ghostscript" and version "7.07" | - |
Affected
| ||||||
Ghostscript Search vendor "Ghostscript" | Ghostscript Search vendor "Ghostscript" for product "Ghostscript" | 8.0.1 Search vendor "Ghostscript" for product "Ghostscript" and version "8.0.1" | - |
Affected
| ||||||
Ghostscript Search vendor "Ghostscript" | Ghostscript Search vendor "Ghostscript" for product "Ghostscript" | 8.15 Search vendor "Ghostscript" for product "Ghostscript" and version "8.15" | - |
Affected
| ||||||
Ghostscript Search vendor "Ghostscript" | Ghostscript Search vendor "Ghostscript" for product "Ghostscript" | 8.15.2 Search vendor "Ghostscript" for product "Ghostscript" and version "8.15.2" | - |
Affected
| ||||||
Ghostscript Search vendor "Ghostscript" | Ghostscript Search vendor "Ghostscript" for product "Ghostscript" | 8.54 Search vendor "Ghostscript" for product "Ghostscript" and version "8.54" | - |
Affected
| ||||||
Ghostscript Search vendor "Ghostscript" | Ghostscript Search vendor "Ghostscript" for product "Ghostscript" | 8.56 Search vendor "Ghostscript" for product "Ghostscript" and version "8.56" | - |
Affected
| ||||||
Ghostscript Search vendor "Ghostscript" | Ghostscript Search vendor "Ghostscript" for product "Ghostscript" | 8.57 Search vendor "Ghostscript" for product "Ghostscript" and version "8.57" | - |
Affected
| ||||||
Ghostscript Search vendor "Ghostscript" | Ghostscript Search vendor "Ghostscript" for product "Ghostscript" | 8.60 Search vendor "Ghostscript" for product "Ghostscript" and version "8.60" | - |
Affected
| ||||||
Ghostscript Search vendor "Ghostscript" | Ghostscript Search vendor "Ghostscript" for product "Ghostscript" | 8.61 Search vendor "Ghostscript" for product "Ghostscript" and version "8.61" | - |
Affected
| ||||||
Ghostscript Search vendor "Ghostscript" | Ghostscript Search vendor "Ghostscript" for product "Ghostscript" | 8.62 Search vendor "Ghostscript" for product "Ghostscript" and version "8.62" | - |
Affected
| ||||||
Ghostscript Search vendor "Ghostscript" | Ghostscript Search vendor "Ghostscript" for product "Ghostscript" | 8.63 Search vendor "Ghostscript" for product "Ghostscript" and version "8.63" | - |
Affected
|