idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
14,339 | savannah | 83a95bd8c8561875b948cadd417c653dbe7ef2e2 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2 | None | 0 | memchr_kwset (char const *s, size_t n, kwset_t kwset)
{
if (kwset->gc1help < 0)
return memchr (s, kwset->gc1, n);
int small_heuristic = 2;
int small = (- (uintptr_t) s % sizeof (long)
+ small_heuristic * sizeof (long));
size_t ntrans = kwset->gc1help < NCHAR && small < n ? small : n;
char c... | 18,099,728,818,456,120,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1345 | The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option. | https://nvd.nist.gov/vuln/detail/CVE-2015-1345 |
14,340 | savannah | 83a95bd8c8561875b948cadd417c653dbe7ef2e2 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2 | None | 0 | tr (char const *trans, char c)
{
return trans ? trans[U(c)] : c;
}
| 248,311,837,724,717,750,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1345 | The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option. | https://nvd.nist.gov/vuln/detail/CVE-2015-1345 |
14,341 | savannah | 83a95bd8c8561875b948cadd417c653dbe7ef2e2 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2 | None | 0 | treedelta (struct tree const *tree,
unsigned int depth,
unsigned char delta[])
{
if (!tree)
return;
treedelta(tree->llink, depth, delta);
treedelta(tree->rlink, depth, delta);
if (depth < delta[tree->label])
delta[tree->label] = depth;
}
| 238,560,226,702,049,630,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1345 | The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option. | https://nvd.nist.gov/vuln/detail/CVE-2015-1345 |
14,342 | savannah | 83a95bd8c8561875b948cadd417c653dbe7ef2e2 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2 | None | 0 | treefails (struct tree const *tree, struct trie const *fail,
struct trie *recourse)
{
struct tree *link;
if (!tree)
return;
treefails(tree->llink, fail, recourse);
treefails(tree->rlink, fail, recourse);
/* Find, in the chain of fails going back to the root, the first
node that has a de... | 266,410,234,267,996,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1345 | The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option. | https://nvd.nist.gov/vuln/detail/CVE-2015-1345 |
14,343 | savannah | 83a95bd8c8561875b948cadd417c653dbe7ef2e2 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2 | None | 0 | treenext (struct tree const *tree, struct trie *next[])
{
if (!tree)
return;
treenext(tree->llink, next);
treenext(tree->rlink, next);
next[tree->label] = tree->trie;
}
| 204,460,611,724,618,470,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1345 | The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option. | https://nvd.nist.gov/vuln/detail/CVE-2015-1345 |
14,347 | harfbuzz | a6a79df5fe2ed2cd307e7a991346faee164e70d9 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9 | Handle malloc failture in the buffer | 0 | hb_buffer_destroy (hb_buffer_t *buffer)
{
HB_OBJECT_DO_DESTROY (buffer);
hb_unicode_funcs_destroy (buffer->unicode);
free (buffer->info);
free (buffer->pos);
free (buffer);
}
| 139,667,113,007,239,450,000,000,000,000,000,000,000 | hb-buffer.cc | 296,683,657,265,868,100,000,000,000,000,000,000,000 | [] | CVE-2011-0064 | The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op... | https://nvd.nist.gov/vuln/detail/CVE-2011-0064 |
14,348 | harfbuzz | a6a79df5fe2ed2cd307e7a991346faee164e70d9 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9 | Handle malloc failture in the buffer | 0 | hb_buffer_get_direction (hb_buffer_t *buffer)
{
return buffer->direction;
}
| 209,146,125,016,122,570,000,000,000,000,000,000,000 | hb-buffer.cc | 296,683,657,265,868,100,000,000,000,000,000,000,000 | [] | CVE-2011-0064 | The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op... | https://nvd.nist.gov/vuln/detail/CVE-2011-0064 |
14,349 | harfbuzz | a6a79df5fe2ed2cd307e7a991346faee164e70d9 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9 | Handle malloc failture in the buffer | 0 | hb_buffer_get_reference_count (hb_buffer_t *buffer)
{
HB_OBJECT_DO_GET_REFERENCE_COUNT (buffer);
}
| 97,921,560,959,633,710,000,000,000,000,000,000,000 | hb-buffer.cc | 296,683,657,265,868,100,000,000,000,000,000,000,000 | [] | CVE-2011-0064 | The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op... | https://nvd.nist.gov/vuln/detail/CVE-2011-0064 |
14,350 | harfbuzz | a6a79df5fe2ed2cd307e7a991346faee164e70d9 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9 | Handle malloc failture in the buffer | 0 | hb_buffer_get_script (hb_buffer_t *buffer)
{
return buffer->script;
}
| 307,872,008,849,091,570,000,000,000,000,000,000,000 | hb-buffer.cc | 296,683,657,265,868,100,000,000,000,000,000,000,000 | [] | CVE-2011-0064 | The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op... | https://nvd.nist.gov/vuln/detail/CVE-2011-0064 |
14,351 | harfbuzz | a6a79df5fe2ed2cd307e7a991346faee164e70d9 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9 | Handle malloc failture in the buffer | 0 | hb_buffer_get_unicode_funcs (hb_buffer_t *buffer)
{
return buffer->unicode;
}
| 102,109,335,274,691,150,000,000,000,000,000,000,000 | hb-buffer.cc | 296,683,657,265,868,100,000,000,000,000,000,000,000 | [] | CVE-2011-0064 | The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op... | https://nvd.nist.gov/vuln/detail/CVE-2011-0064 |
14,352 | harfbuzz | a6a79df5fe2ed2cd307e7a991346faee164e70d9 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9 | Handle malloc failture in the buffer | 0 | hb_buffer_reference (hb_buffer_t *buffer)
{
HB_OBJECT_DO_REFERENCE (buffer);
}
| 239,348,656,081,988,800,000,000,000,000,000,000,000 | hb-buffer.cc | 296,683,657,265,868,100,000,000,000,000,000,000,000 | [] | CVE-2011-0064 | The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op... | https://nvd.nist.gov/vuln/detail/CVE-2011-0064 |
14,353 | harfbuzz | a6a79df5fe2ed2cd307e7a991346faee164e70d9 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9 | Handle malloc failture in the buffer | 0 | hb_buffer_set_direction (hb_buffer_t *buffer,
hb_direction_t direction)
{
buffer->direction = direction;
}
| 199,702,388,474,071,350,000,000,000,000,000,000,000 | hb-buffer.cc | 296,683,657,265,868,100,000,000,000,000,000,000,000 | [] | CVE-2011-0064 | The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op... | https://nvd.nist.gov/vuln/detail/CVE-2011-0064 |
14,354 | harfbuzz | a6a79df5fe2ed2cd307e7a991346faee164e70d9 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9 | Handle malloc failture in the buffer | 0 | hb_buffer_set_script (hb_buffer_t *buffer,
hb_script_t script)
{
buffer->script = script;
}
| 275,574,185,326,423,240,000,000,000,000,000,000,000 | hb-buffer.cc | 296,683,657,265,868,100,000,000,000,000,000,000,000 | [] | CVE-2011-0064 | The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op... | https://nvd.nist.gov/vuln/detail/CVE-2011-0064 |
14,355 | harfbuzz | a6a79df5fe2ed2cd307e7a991346faee164e70d9 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9 | Handle malloc failture in the buffer | 0 | hb_buffer_set_unicode_funcs (hb_buffer_t *buffer,
hb_unicode_funcs_t *unicode)
{
if (!unicode)
unicode = &_hb_unicode_funcs_nil;
hb_unicode_funcs_reference (unicode);
hb_unicode_funcs_destroy (buffer->unicode);
buffer->unicode = unicode;
}
| 29,017,524,112,433,670,000,000,000,000,000,000,000 | hb-buffer.cc | 296,683,657,265,868,100,000,000,000,000,000,000,000 | [] | CVE-2011-0064 | The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op... | https://nvd.nist.gov/vuln/detail/CVE-2011-0064 |
14,356 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | check_data_region (struct tar_sparse_file *file, size_t i)
{
off_t size_left;
if (!lseek_or_error (file, file->stat_info->sparse_map[i].offset))
return false;
size_left = file->stat_info->sparse_map[i].numbytes;
mv_size_left (file->stat_info->archive_file_size - file->dumped_size);
while (size_left > 0)... | 5,526,048,496,546,706,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,357 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | check_sparse_region (struct tar_sparse_file *file, off_t beg, off_t end)
{
if (!lseek_or_error (file, beg))
return false;
while (beg < end)
{
size_t bytes_read;
size_t rdsize = BLOCKSIZE < end - beg ? BLOCKSIZE : end - beg;
char diff_buffer[BLOCKSIZE];
bytes_read = safe_read (file-... | 222,458,617,585,500,950,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,358 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | decode_num (uintmax_t *num, char const *arg, uintmax_t maxval)
{
uintmax_t u;
char *arg_lim;
if (!ISDIGIT (*arg))
return false;
errno = 0;
u = strtoumax (arg, &arg_lim, 10);
if (! (u <= maxval && errno != ERANGE) || *arg_lim)
return false;
*num = u;
return true;
}
| 63,324,700,854,714,390,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,359 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | oldgnu_add_sparse (struct tar_sparse_file *file, struct sparse *s)
{
struct sp_array sp;
if (s->numbytes[0] == '\0')
return add_finish;
sp.offset = OFF_FROM_HEADER (s->offset);
sp.numbytes = OFF_FROM_HEADER (s->numbytes);
if (sp.offset < 0 || sp.numbytes < 0
|| INT_ADD_OVERFLOW (sp.offset, sp.numby... | 74,407,608,565,405,095,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,360 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | oldgnu_dump_header (struct tar_sparse_file *file)
{
off_t block_ordinal = current_block_ordinal ();
union block *blk;
size_t i;
blk = start_header (file->stat_info);
blk->header.typeflag = GNUTYPE_SPARSE;
if (file->stat_info->sparse_map_avail > SPARSES_IN_OLDGNU_HEADER)
blk->oldgnu_header.isextended = ... | 245,423,478,404,266,930,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,361 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | oldgnu_get_sparse_info (struct tar_sparse_file *file)
{
size_t i;
union block *h = current_header;
int ext_p;
enum oldgnu_add_status rc;
file->stat_info->sparse_map_avail = 0;
for (i = 0; i < SPARSES_IN_OLDGNU_HEADER; i++)
{
rc = oldgnu_add_sparse (file, &h->oldgnu_header.sp[i]);
if (rc != ... | 24,413,034,332,985,275,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,362 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | oldgnu_sparse_member_p (struct tar_sparse_file *file __attribute__ ((unused)))
{
return current_header->header.typeflag == GNUTYPE_SPARSE;
}
| 275,652,842,725,951,600,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,363 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | oldgnu_store_sparse_info (struct tar_sparse_file *file, size_t *pindex,
struct sparse *sp, size_t sparse_size)
{
for (; *pindex < file->stat_info->sparse_map_avail
&& sparse_size > 0; sparse_size--, sp++, ++*pindex)
{
OFF_TO_CHARS (file->stat_info->sparse_map[*pindex].offset,
sp->offset);
... | 215,810,348,784,289,800,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,364 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | pax_dump_header (struct tar_sparse_file *file)
{
file->stat_info->sparse_major = tar_sparse_major;
file->stat_info->sparse_minor = tar_sparse_minor;
return (file->stat_info->sparse_major == 0) ?
pax_dump_header_0 (file) : pax_dump_header_1 (file);
}
| 24,802,498,478,482,727,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,365 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | pax_dump_header_0 (struct tar_sparse_file *file)
{
off_t block_ordinal = current_block_ordinal ();
union block *blk;
size_t i;
char nbuf[UINTMAX_STRSIZE_BOUND];
struct sp_array *map = file->stat_info->sparse_map;
char *save_file_name = NULL;
/* Store the real file size */
xheader_store ("GNU.sparse.siz... | 41,796,229,012,369,013,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,366 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | pax_sparse_member_p (struct tar_sparse_file *file)
{
return file->stat_info->sparse_map_avail > 0
|| file->stat_info->sparse_major > 0;
}
| 7,279,484,723,444,561,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,367 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | pax_start_header (struct tar_stat_info *st)
{
off_t realsize = st->stat.st_size;
union block *blk;
st->stat.st_size = st->archive_file_size;
blk = start_header (st);
st->stat.st_size = realsize;
return blk;
}
| 180,789,592,159,917,450,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,368 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | sparse_diff_file (int fd, struct tar_stat_info *st)
{
bool rc = true;
struct tar_sparse_file file;
size_t i;
off_t offset = 0;
if (!tar_sparse_init (&file))
return dump_status_not_implemented;
file.stat_info = st;
file.fd = fd;
file.seekable = true; /* File *must* be seekable for compare to work *... | 8,974,954,236,323,523,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,369 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | sparse_dump_file (int fd, struct tar_stat_info *st)
{
bool rc;
struct tar_sparse_file file;
if (!tar_sparse_init (&file))
return dump_status_not_implemented;
file.stat_info = st;
file.fd = fd;
file.seekable = true; /* File *must* be seekable for dump to work */
rc = sparse_scan_file (&file);
if (... | 298,479,498,932,788,030,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,370 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | sparse_dump_region (struct tar_sparse_file *file, size_t i)
{
union block *blk;
off_t bytes_left = file->stat_info->sparse_map[i].numbytes;
if (!lseek_or_error (file, file->stat_info->sparse_map[i].offset))
return false;
while (bytes_left > 0)
{
size_t bufsize = (bytes_left > BLOCKSIZE) ? BLOCKS... | 149,311,081,653,364,360,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,371 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | sparse_extract_region (struct tar_sparse_file *file, size_t i)
{
off_t write_size;
if (!lseek_or_error (file, file->stat_info->sparse_map[i].offset))
return false;
write_size = file->stat_info->sparse_map[i].numbytes;
if (write_size == 0)
{
/* Last block of the file is a hole */
if (file-... | 107,608,456,604,416,180,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,372 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | star_get_sparse_info (struct tar_sparse_file *file)
{
size_t i;
union block *h = current_header;
int ext_p;
enum oldgnu_add_status rc = add_ok;
file->stat_info->sparse_map_avail = 0;
if (h->star_in_header.prefix[0] == '\0'
&& h->star_in_header.sp[0].offset[10] != '\0')
{
/* Old star format... | 95,556,342,580,482,680,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,373 | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | None | 0 | star_sparse_member_p (struct tar_sparse_file *file __attribute__ ((unused)))
{
return current_header->header.typeflag == GNUTYPE_SPARSE;
}
| 67,249,748,667,062,760,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 |
14,392 | ghostscript | 961b10cdd71403072fb99401a45f3bef6ce53626 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626 | None | 0 | static inline int s16(byte *p)
{
return (signed short)( (p[0] << 8) | p[1] );
}
| 331,037,985,417,771,100,000,000,000,000,000,000,000 | xpsfont.c | 237,740,818,077,512,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9740 | The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9740 |
14,393 | ghostscript | 961b10cdd71403072fb99401a45f3bef6ce53626 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626 | None | 0 | static inline int u16(byte *p)
{
return (p[0] << 8) | p[1];
}
| 70,313,692,716,440,670,000,000,000,000,000,000,000 | xpsfont.c | 237,740,818,077,512,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9740 | The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9740 |
14,394 | ghostscript | 961b10cdd71403072fb99401a45f3bef6ce53626 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626 | None | 0 | static inline int u24(byte *p)
{
return (p[0] << 16) | (p[1] << 8) | p[2];
}
| 167,238,634,167,240,260,000,000,000,000,000,000,000 | xpsfont.c | 237,740,818,077,512,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9740 | The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9740 |
14,395 | ghostscript | 961b10cdd71403072fb99401a45f3bef6ce53626 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626 | None | 0 | static inline int u32(byte *p)
{
return (p[0] << 24) | (p[1] << 16) | (p[2] << 8) | p[3];
}
| 164,005,817,604,969,290,000,000,000,000,000,000,000 | xpsfont.c | 237,740,818,077,512,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9740 | The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9740 |
14,396 | ghostscript | 961b10cdd71403072fb99401a45f3bef6ce53626 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626 | None | 0 | xps_count_font_encodings(xps_font_t *font)
{
return font->cmapsubcount;
}
| 62,738,717,690,887,720,000,000,000,000,000,000,000 | xpsfont.c | 237,740,818,077,512,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9740 | The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9740 |
14,397 | ghostscript | 961b10cdd71403072fb99401a45f3bef6ce53626 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626 | None | 0 | xps_find_sfnt_table(xps_font_t *font, const char *name, int *lengthp)
{
int offset;
int ntables;
int i;
if (font->length < 12)
return -1;
if (!memcmp(font->data, "ttcf", 4))
{
int nfonts = u32(font->data + 8);
if (font->subfontid < 0 || font->subfontid >= nfonts)
... | 149,369,545,525,733,000,000,000,000,000,000,000,000 | xpsfont.c | 237,740,818,077,512,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9740 | The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9740 |
14,398 | ghostscript | 961b10cdd71403072fb99401a45f3bef6ce53626 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626 | None | 0 | xps_load_sfnt_name(xps_font_t *font, char *namep, const int buflen)
{
byte *namedata;
int offset, length;
/*int format;*/
int count, stringoffset;
int found;
int i, k;
found = 0;
strcpy(namep, "Unknown");
offset = xps_find_sfnt_table(font, "name", &length);
if (offset < 0 || le... | 325,261,375,591,148,470,000,000,000,000,000,000,000 | xpsfont.c | 237,740,818,077,512,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9740 | The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9740 |
14,399 | ghostscript | 961b10cdd71403072fb99401a45f3bef6ce53626 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626 | None | 0 | xps_new_font(xps_context_t *ctx, byte *buf, int buflen, int index)
{
xps_font_t *font;
int code;
font = xps_alloc(ctx, sizeof(xps_font_t));
if (!font)
{
gs_throw(gs_error_VMerror, "out of memory");
return NULL;
}
font->data = buf;
font->length = buflen;
font->font =... | 136,363,984,996,029,400,000,000,000,000,000,000,000 | xpsfont.c | 237,740,818,077,512,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9740 | The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9740 |
14,400 | ghostscript | 961b10cdd71403072fb99401a45f3bef6ce53626 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626 | None | 0 | xps_select_font_encoding(xps_font_t *font, int idx)
{
byte *cmapdata, *entry;
int pid, eid;
if (idx < 0 || idx >= font->cmapsubcount)
return 0;
cmapdata = font->data + font->cmaptable;
entry = cmapdata + 4 + idx * 8;
pid = u16(entry + 0);
eid = u16(entry + 2);
font->cmapsubtable ... | 130,047,091,764,416,350,000,000,000,000,000,000,000 | xpsfont.c | 198,373,143,573,959,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9740 | The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9740 |
14,401 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static Bool Calc_Length( EXEC_OP )
{
CUR.opcode = CUR.code[CUR.IP];
switch ( CUR.opcode )
{
case 0x40:
if ( CUR.IP + 1 >= CUR.codeSize )
return FAILURE;
CUR.length = CUR.code[CUR.IP + 1] + 2;
break;
case 0x41:
if ( CUR.IP + 1 >= CUR.codeSize )
return F... | 112,577,454,586,979,860,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,402 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Compute_Funcs( EXEC_OP )
{
if ( CUR.GS.freeVector.x == 0x4000 )
{
CUR.func_freeProj = (TProject_Function)Project_x;
CUR.F_dot_P = CUR.GS.projVector.x * 0x10000L;
}
else
{
if ( CUR.GS.freeVector.y == 0x4000 )
{
CUR.func_freeProj = (TProject_Funct... | 232,893,983,865,036,170,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,403 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static Bool Compute_Point_Displacement( EXEC_OPS
PCoordinates x,
PCoordinates y,
PGlyph_Zone zone,
Int* refp )
{
TGlyph_Zone ... | 287,882,677,423,104,730,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,404 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Compute_Round( EXEC_OPS Byte round_mode )
{
switch ( round_mode )
{
case TT_Round_Off:
CUR.func_round = (TRound_Function)Round_None;
break;
case TT_Round_To_Grid:
CUR.func_round = (TRound_Function)Round_To_Grid;
break;
case TT_Round_Up_To_Grid:
CUR.f... | 7,484,615,955,509,031,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,405 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static Long Current_Ratio( EXEC_OP )
{
if ( CUR.metrics.ratio )
return CUR.metrics.ratio;
if ( CUR.GS.projVector.y == 0 )
CUR.metrics.ratio = CUR.metrics.x_ratio;
else if ( CUR.GS.projVector.x == 0 )
CUR.metrics.ratio = CUR.metrics.y_ratio;
else
{
Long x, y;
x... | 270,235,289,471,057,770,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,406 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Direct_Move( EXEC_OPS PGlyph_Zone zone,
Int point,
TT_F26Dot6 distance )
{
TT_F26Dot6 v;
v = CUR.GS.freeVector.x;
if ( v != 0 )
{
zone->cur_x[point] += MulDiv_Round( distance,
... | 129,869,091,916,840,900,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,407 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Direct_Move_X( EXEC_OPS PGlyph_Zone zone,
Int point,
TT_F26Dot6 distance )
{ (void)exc;
zone->cur_x[point] += distance;
zone->touch[point] |= TT_Flag_Touched_X;
}
| 287,242,273,403,862,500,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,408 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Direct_Move_Y( EXEC_OPS PGlyph_Zone zone,
Int point,
TT_F26Dot6 distance )
{ (void)exc;
zone->cur_y[point] += distance;
zone->touch[point] |= TT_Flag_Touched_Y;
}
| 166,915,658,342,818,800,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,409 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static TT_F26Dot6 Dual_Project( EXEC_OPS TT_F26Dot6 Vx, TT_F26Dot6 Vy )
{
THROW_PATENTED;
return 0;
}
| 130,892,856,462,500,460,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,410 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static TT_F26Dot6 FUnits_To_Pixels( EXEC_OPS Int distance )
{
return MulDiv_Round( distance,
CUR.metrics.scale1,
CUR.metrics.scale2 );
}
| 181,243,311,668,467,650,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,411 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static TT_F26Dot6 Free_Project( EXEC_OPS TT_F26Dot6 Vx, TT_F26Dot6 Vy )
{
THROW_PATENTED;
return 0;
}
| 251,159,287,294,344,170,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,412 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static Short GetShortIns( EXEC_OP )
{
/* Reading a byte stream so there is no endianess (DaveP) */
CUR.IP += 2;
return ( CUR.code[CUR.IP-2] << 8) +
CUR.code[CUR.IP-1];
}
| 43,953,055,151,561,110,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,413 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_AA( INS_ARG )
{ (void)exc; (void)args;
/* Intentional - no longer supported */
}
| 316,334,211,290,102,700,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,414 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_ABS( INS_ARG )
{ (void)exc;
args[0] = ABS( args[0] );
}
| 139,994,646,317,824,520,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,415 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_ADD( INS_ARG )
{ (void)exc;
args[0] += args[1];
}
| 248,310,338,118,490,750,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,416 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_ALIGNPTS( INS_ARG )
{
Int p1, p2;
TT_F26Dot6 distance;
p1 = (Int)args[0];
p2 = (Int)args[1];
if ( BOUNDS( args[0], CUR.zp1.n_points ) ||
BOUNDS( args[1], CUR.zp0.n_points ) )
{
CUR.error = TT_Err_Invalid_Reference;
return;
}
distance =... | 5,641,549,676,838,549,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,417 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_ALIGNRP( INS_ARG )
{
Int point;
TT_F26Dot6 distance;
(void)args;
if ( CUR.top < CUR.GS.loop )
{
CUR.error = TT_Err_Invalid_Reference;
return;
}
while ( CUR.GS.loop > 0 )
{
CUR.args--;
point = (Int)CUR.stack[CUR.args];
if ( B... | 301,253,683,469,405,050,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,418 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_AND( INS_ARG )
{ (void)exc;
if ( args[0] != 0 && args[1] != 0 )
args[0] = 1;
else
args[0] = 0;
}
| 208,428,179,294,701,700,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,419 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_CALL( INS_ARG )
{
PCallRecord pCrec;
if ( BOUNDS( args[0], CUR.numFDefs ) || !CUR.FDefs[args[0]].Active )
{
CUR.error = TT_Err_Invalid_Reference;
return;
}
if ( CUR.callTop >= CUR.callSize )
{
CUR.error = TT_Err_Stack_Overflow;
return;
}
D... | 56,048,214,110,338,380,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,420 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_CEILING( INS_ARG )
{ (void)exc;
args[0] = (args[0] + 63) & (-64);
}
| 142,876,912,607,697,730,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,421 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_CINDEX( INS_ARG )
{
Long L;
L = args[0];
if ( L<0 || L > CUR.args )
CUR.error = TT_Err_Invalid_Reference;
else
args[0] = CUR.stack[CUR.args - L];
}
| 147,734,490,619,761,320,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,422 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_CLEAR( INS_ARG )
{ (void)args;
CUR.new_top = 0;
}
| 59,307,315,405,978,210,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,423 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_DEBUG( INS_ARG )
{ (void)args;
CUR.error = TT_Err_Debug_OpCode;
}
| 120,553,848,060,043,000,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,424 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_DELTAC( INS_ARG )
{
Long nump, k;
Long A, B, C;
nump = args[0];
for ( k = 1; k <= nump; k++ )
{
if ( CUR.args < 2 )
{
CUR.error = TT_Err_Too_Few_Arguments;
return;
}
CUR.args -= 2;
A = CUR.stack[CUR.args + 1];
B = CUR.sta... | 206,935,054,898,363,340,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,425 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_DELTAP( INS_ARG )
{
Int k;
Long A, B, C, nump;
nump = args[0];
for ( k = 1; k <= nump; k++ )
{
if ( CUR.args < 2 )
{
CUR.error = TT_Err_Too_Few_Arguments;
return;
}
CUR.args -= 2;
A = CUR.stack[CUR.args + 1];
B = CUR.sta... | 76,473,349,090,415,380,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,426 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_DEPTH( INS_ARG )
{
args[0] = CUR.top;
}
| 57,053,433,026,326,345,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,427 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_DIV( INS_ARG )
{
if ( args[1] == 0 )
{
CUR.error = TT_Err_Divide_By_Zero;
return;
}
args[0] = MulDiv_Round( args[0], 64L, args[1] );
DBG_PRINT1(" %d", args[0]);
}
| 233,533,966,853,551,100,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,428 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_DUP( INS_ARG )
{ (void)exc;
args[1] = args[0];
}
| 51,499,664,176,492,940,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,429 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_EIF( INS_ARG )
{ (void)exc; (void)args;
/* nothing to do */
}
| 331,431,245,235,897,170,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,430 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_ELSE( INS_ARG )
{
Int nIfs;
(void)args;
nIfs = 1;
do
{
if ( SKIP_Code() == FAILURE )
return;
switch ( CUR.opcode )
{
case 0x58: /* IF */
nIfs++;
break;
case 0x59: /* EIF */
nIfs--;
break;
}
... | 55,773,617,842,796,010,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,431 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_ENDF( INS_ARG )
{
PCallRecord pRec;
(void)args;
if ( CUR.callTop <= 0 ) /* We encountered an ENDF without a call */
{
CUR.error = TT_Err_ENDF_In_Exec_Stream;
return;
}
CUR.callTop--;
pRec = &CUR.callStack[CUR.callTop];
pRec->Cur_Count--;
CU... | 123,825,729,373,029,680,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,432 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_EQ( INS_ARG )
{ (void)exc;
if ( args[0] == args[1] )
args[0] = 1;
else
args[0] = 0;
}
| 35,322,659,608,240,854,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,433 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_EVEN( INS_ARG )
{
if ( (CUR_Func_round( args[0], 0L ) & 127) == 0 )
args[0] = 1;
else
args[0] = 0;
}
| 24,172,464,422,358,355,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,434 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_FDEF( INS_ARG )
{
PDefRecord pRec;
if ( BOUNDS( args[0], CUR.numFDefs ) )
{
CUR.error = TT_Err_Invalid_Reference;
return;
}
pRec = &CUR.FDefs[args[0]];
pRec->Range = CUR.curRange;
pRec->Opc = (Byte)(args[0]);
pRec->Start = CUR.IP + 1;
pRec->A... | 95,630,302,802,270,960,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,435 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_FLIPOFF( INS_ARG )
{ (void)args;
CUR.GS.auto_flip = FALSE;
}
| 15,854,285,820,354,400,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,436 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_FLIPON( INS_ARG )
{ (void)args;
CUR.GS.auto_flip = TRUE;
}
| 275,407,057,814,495,600,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,437 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_FLIPRGON( INS_ARG )
{
Long I, K, L;
K = args[1];
L = args[0];
if ( BOUNDS( K, CUR.pts.n_points ) ||
BOUNDS( L, CUR.pts.n_points ) )
{
CUR.error = TT_Err_Invalid_Reference;
return;
}
for ( I = L; I <= K; I++ )
CUR.pts.touch[I] |= TT_Flag_On_... | 155,224,313,175,218,380,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,438 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_FLOOR( INS_ARG )
{ (void)exc;
args[0] &= -64;
}
| 277,880,419,403,934,000,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,439 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_GC( INS_ARG )
{
Long L;
L = args[0];
if ( BOUNDS( L, CUR.zp2.n_points ) )
{
CUR.error = TT_Err_Invalid_Reference;
return;
}
switch ( CUR.opcode & 1 )
{
case 0:
L = CUR_Func_project( CUR.zp2.cur_x[L],
CUR.zp2.cur_y[L] ... | 301,480,656,963,225,260,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,440 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_GFV( INS_ARG )
{
args[0] = CUR.GS.freeVector.x;
args[1] = CUR.GS.freeVector.y;
}
| 115,739,652,296,497,200,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,441 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_GPV( INS_ARG )
{
args[0] = CUR.GS.projVector.x;
args[1] = CUR.GS.projVector.y;
}
| 222,441,896,574,937,430,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,442 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_GT( INS_ARG )
{ (void)exc;
if ( args[0] > args[1] )
args[0] = 1;
else
args[0] = 0;
}
| 332,062,630,633,343,870,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,443 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_GTEQ( INS_ARG )
{ (void)exc;
if ( args[0] >= args[1] )
args[0] = 1;
else
args[0] = 0;
}
| 331,403,327,419,854,730,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,444 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static Bool Ins_Goto_CodeRange( EXEC_OPS Int aRange, Int aIP )
{
TCodeRange* WITH;
if ( aRange < 1 || aRange > 3 )
{
CUR.error = TT_Err_Bad_Argument;
return FAILURE;
}
WITH = &CUR.codeRangeTable[aRange - 1];
if ( WITH->Base == NULL ) /* invalid coderange */
{
... | 312,088,440,994,411,600,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,445 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_IDEF( INS_ARG )
{
if (CUR.countIDefs >= CUR.numIDefs || args[0] > 255)
CUR.error = TT_Err_Storage_Overflow;
else
{
PDefRecord pTDR;
CUR.IDefPtr[(Byte)(args[0])] = CUR.countIDefs;
pTDR = &CUR.IDefs[CUR.countIDefs++];
pTDR->Opc = (Byte)(args[0... | 245,046,248,932,865,030,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,446 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_IF( INS_ARG )
{
Int nIfs;
Bool Out;
if ( args[0] != 0 )
return;
nIfs = 1;
Out = 0;
do
{
if ( SKIP_Code() == FAILURE )
return;
switch ( CUR.opcode )
{
case 0x58: /* IF */
nIfs++;
break;
case 0x1b: ... | 84,900,707,593,551,900,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,447 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_INSTCTRL( INS_ARG )
{
Long K, L;
K = args[1];
L = args[0];
if ( K < 0 || K > 3 )
{
CUR.error = TT_Err_Invalid_Reference;
return;
}
CUR.GS.instruct_control = (Int)((CUR.GS.instruct_control & (~K)) | (L & K));
}
| 295,668,471,617,596,670,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,448 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_IP( INS_ARG )
{
TT_F26Dot6 org_a, org_b, org_x,
cur_a, cur_b, cur_x,
distance;
Int point;
(void)args;
if ( CUR.top < CUR.GS.loop ||
BOUNDS(CUR.GS.rp1, CUR.zp0.n_points) ||
BOUNDS(CUR.GS.rp2, CUR.zp1.n_points))
{
C... | 182,601,607,540,285,200,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,449 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_ISECT( INS_ARG )
{
Long point, /* are these Ints or Longs? */
a0, a1,
b0, b1;
TT_F26Dot6 discriminant;
TT_F26Dot6 dx, dy,
dax, day,
dbx, dby;
TT_F26Dot6 val;
TT_Vector R;
point = args[0];
a0 = arg... | 82,181,783,434,404,970,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,450 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_IUP( INS_ARG )
{
struct LOC_Ins_IUP V;
unsigned char mask;
Long first_point; /* first point of contour */
Long end_point; /* end point (last+1) of contour */
Long first_touched; /* first touched point in contour */
Long cur_touched; /* current touch... | 22,162,722,561,741,580,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,451 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_JROT( INS_ARG )
{
if ( args[1] != 0 )
{
CUR.IP += (Int)(args[0]);
CUR.step_ins = FALSE;
/* See JMPR below */
if(CUR.IP > CUR.codeSize ||
(CUR.code[CUR.IP] != 0x2D && CUR.code[CUR.IP - 1] == 0x2D))
CUR.IP -= 1;
}
}
| 262,916,535,602,627,030,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,452 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_LOOPCALL( INS_ARG )
{
PCallRecord pTCR;
if ( BOUNDS( args[1], CUR.numFDefs ) || !CUR.FDefs[args[1]].Active )
{
CUR.error = TT_Err_Invalid_Reference;
return;
}
if ( CUR.callTop >= CUR.callSize )
{
CUR.error = TT_Err_Stack_Overflow;
return;
}
... | 105,670,859,021,685,040,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,453 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_LT( INS_ARG )
{ (void)exc;
if ( args[0] < args[1] )
args[0] = 1;
else
args[0] = 0;
}
| 137,999,184,880,285,700,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,454 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_LTEQ( INS_ARG )
{ (void)exc;
if ( args[0] <= args[1] )
args[0] = 1;
else
args[0] = 0;
}
| 138,626,552,672,208,180,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,455 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_MAX( INS_ARG )
{ (void)exc;
if ( args[1] > args[0] )
args[0] = args[1];
}
| 114,277,236,983,453,770,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,456 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_MD( INS_ARG )
{
Long K, L;
TT_F26Dot6 D;
K = args[1];
L = args[0];
if( BOUNDS( args[0], CUR.zp2.n_points ) ||
BOUNDS( args[1], CUR.zp1.n_points ) )
{
CUR.error = TT_Err_Invalid_Reference;
return;
}
if ( CUR.opcode & 1 )
D = CUR_Func... | 186,050,444,122,027,660,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,457 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_MDRP( INS_ARG )
{
Int point;
TT_F26Dot6 distance,
org_dist;
point = (Int)args[0];
if ( BOUNDS( args[0], CUR.zp1.n_points ) ||
BOUNDS( CUR.GS.rp0, CUR.zp0.n_points) )
{
/* Current version of FreeType silently ignores this out of bounds ... | 286,795,312,573,774,330,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,458 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_MIAP( INS_ARG )
{
Int cvtEntry, point;
TT_F26Dot6 distance,
org_dist;
cvtEntry = (Int)args[1];
point = (Int)args[0];
if ( BOUNDS( args[0], CUR.zp0.n_points ) ||
BOUNDS( args[1], CUR.cvtSize ) )
{
/* Ignore these errors, abo... | 58,001,255,515,255,560,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
14,459 | ghostscript | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | None | 0 | static void Ins_MIN( INS_ARG )
{ (void)exc;
if ( args[1] < args[0] )
args[0] = args[1];
}
| 41,310,686,306,388,196,000,000,000,000,000,000,000 | ttinterp.c | 3,055,912,626,797,426,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9739 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9739 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.