CVE Vulnerabilities

CVE-2016-7979

Incorrect Type Conversion or Cast

Published: May 23, 2017 | Modified: Apr 20, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
5.1 MODERATE
AV:N/AC:H/Au:N/C:P/I:P/A:P
RedHat/V3
5.8 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initialize_dsc_parser.

Weakness

The product does not correctly convert an object, resource, or structure from one type to a different type.

Affected Software

NameVendorStart VersionEnd Version
GhostscriptArtifex*9.20 (including)
Red Hat Enterprise Linux 6RedHatghostscript-0:8.70-21.el6_8.1*
Red Hat Enterprise Linux 7RedHatghostscript-0:9.07-20.el7_3.1*
GhostscriptUbuntudevel*
GhostscriptUbuntuesm-infra/xenial*
GhostscriptUbuntuprecise*
GhostscriptUbuntutrusty*
GhostscriptUbuntuxenial*
GhostscriptUbuntuyakkety*

References