Vulnerability Name: | CVE-2020-16297 (CCN-186726) | ||||||||||||||||||
Assigned: | 2019-11-04 | ||||||||||||||||||
Published: | 2019-11-04 | ||||||||||||||||||
Updated: | 2022-08-24 | ||||||||||||||||||
Summary: | A buffer overflow vulnerability in FloydSteinbergDitheringC() in contrib/gdevbjca.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. | ||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.8 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||
Vulnerability Type: | CWE-787 CWE-125 | ||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-16297 Source: MISC Type: Exploit, Issue Tracking, Vendor Advisory https://bugs.ghostscript.com/show_bug.cgi?id=701800 Source: XF Type: UNKNOWN ghostscript-cve202016297-dos(186726) Source: MISC Type: Patch, Vendor Advisory https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=bf72f1a3dd5392ee8291e3b1518a0c2c5dc6ba39 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20200820 [SECURITY] [DLA 2335-1] ghostscript security update Source: GENTOO Type: Third Party Advisory GLSA-202008-20 Source: UBUNTU Type: Third Party Advisory USN-4469-1 Source: DEBIAN Type: Third Party Advisory DSA-4748 Source: CCN Type: Ghostscript Web site Ghostscript Source: CCN Type: WhiteSource Vulnerability Database CVE-2020-16297 | ||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||
Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
BACK |