Out-of-bounds read in Ghostscript - CVE-2017-9835
Published: October 2, 2017
Vulnerability identifier: #VU8646
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-9835
CWE-ID: CWE-125
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Artifex Software, Inc.
Affected software:
Ghostscript
Ghostscript
Detailed vulnerability description
The vulnerability allows a remote attacker to cause DoS conditions on the target system.
The weakness exists due to out-of-bounds read in gs_alloc_ref_array function in psi/ialloc.c when processing documents. A remote attacker can send a specially crafted document, trick the victim into processing it, trigger out-of-bounds read and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
The weakness exists due to out-of-bounds read in gs_alloc_ref_array function in psi/ialloc.c when processing documents. A remote attacker can send a specially crafted document, trick the victim into processing it, trigger out-of-bounds read and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
How to mitigate CVE-2017-9835
Install update from GIT repository.
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=cfde94be1d4286bc47633c6e6eaf4e659bd78066
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=cfde94be1d4286bc47633c6e6eaf4e659bd78066