Heap-based buffer overflow in Debian Linux - CVE-2016-6525
Published: September 22, 2016 / Updated: August 4, 2020
Debian Linux
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the pdf_load_mesh_params function in pdf/pdf-shade.c in MuPDF. A remote attacker can use a large decode array. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2016-6525
Sources
- http://bugs.ghostscript.com/show_bug.cgi?id=696954
- http://git.ghostscript.com/?p=mupdf.git;h=39b0f07dd960f34e7e6bf230ffc3d87c41ef0f2e
- http://www.debian.org/security/2016/dsa-3655
- http://www.openwall.com/lists/oss-security/2016/08/03/8
- http://www.securityfocus.com/bid/92266
- https://security.gentoo.org/glsa/201702-12