// For flags

CVE-2012-4405

argyllcms: Array index error leading to heap-based bufer OOB write

Severity Score

7.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple integer underflows in the icmLut_allocate function in International Color Consortium (ICC) Format library (icclib), as used in Ghostscript 9.06 and Argyll Color Management System, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) PostScript or (2) PDF file with embedded images, which triggers a heap-based buffer overflow. NOTE: this issue is also described as an array index error.

Múltiples desbordamientos inferiores de enteros en la función icmLut_allocate en la librería del formato International Color Consortium (ICC),icclib, tal y como se utiliza en Ghostscript v9.06 y Argyll Color Management System, permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) y posiblemente ejecutar código de su elección a través de un (1) PostScript o (2) Archivo PDF hecho a mano con imágenes incrustadas, lo que provoca un desbordamiento de búfer basado en memoria dinámica (heap). NOTA: este problema se describe también como un error de índice de matriz.

An update that fixes one vulnerability is now available. The following security issue was fixed in ghostscript. Multiple integer underflows in the icmLut_allocate function in International Color Consortium Format library, as used in Ghostscript 9.06 and Argyll Color Management System, allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PostScript or PDF file with embedded images, which triggers a heap-based buffer overflow. NOTE. This issue is also described as an array index error.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-08-21 CVE Reserved
  • 2012-09-11 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-05-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-189: Numeric Errors
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Argyllcms
Search vendor "Argyllcms"
Cms
Search vendor "Argyllcms" for product "Cms"
--
Affected
Color
Search vendor "Color"
Icclib
Search vendor "Color" for product "Icclib"
--
Affected
Ghostscript
Search vendor "Ghostscript"
Ghostscript
Search vendor "Ghostscript" for product "Ghostscript"
9.06
Search vendor "Ghostscript" for product "Ghostscript" and version "9.06"
-
Affected