CVE-2016-8602Incorrect Type Conversion or Cast in Ghostscript

Severity
7.8HIGHNVD
OSV5.5
EPSS
1.2%
top 20.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 14
Latest updateMay 14

Description

The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Postscript document that calls .sethalftone5 with an empty operand stack.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

Debianartifex/ghostscript< 9.19~dfsg-3.1+3
Ubuntuartifex/ghostscript< 9.10~dfsg-0ubuntu10.5+1

Patches

🔴Vulnerability Details

4
GHSA
GHSA-m22m-c5xc-v6jq: The2022-05-14
OSV
CVE-2016-8602: The2017-04-14
CVEList
CVE-2016-8602: The2017-04-14
OSV
ghostscript vulnerabilities2016-12-02

📋Vendor Advisories

3
Ubuntu
Ghostscript vulnerabilities2016-12-02
Red Hat
ghostscript: check for sufficient params in .sethalftone52016-10-08
Debian
CVE-2016-8602: ghostscript - The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remot...2016

💬Community

2
Bugzilla
CVE-2016-8602 ghostscript: check for sufficient params in .sethalftone5 [fedora-all]2016-10-12
Bugzilla
CVE-2016-8602 ghostscript: check for sufficient params in .sethalftone52016-10-12
CVE-2016-8602 — Incorrect Type Conversion or Cast | cvebase