idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
14,339
savannah
83a95bd8c8561875b948cadd417c653dbe7ef2e2
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2
None
0
memchr_kwset (char const *s, size_t n, kwset_t kwset) { if (kwset->gc1help < 0) return memchr (s, kwset->gc1, n); int small_heuristic = 2; int small = (- (uintptr_t) s % sizeof (long) + small_heuristic * sizeof (long)); size_t ntrans = kwset->gc1help < NCHAR && small < n ? small : n; char c...
18,099,728,818,456,120,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-1345
The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.
https://nvd.nist.gov/vuln/detail/CVE-2015-1345
14,340
savannah
83a95bd8c8561875b948cadd417c653dbe7ef2e2
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2
None
0
tr (char const *trans, char c) { return trans ? trans[U(c)] : c; }
248,311,837,724,717,750,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-1345
The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.
https://nvd.nist.gov/vuln/detail/CVE-2015-1345
14,341
savannah
83a95bd8c8561875b948cadd417c653dbe7ef2e2
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2
None
0
treedelta (struct tree const *tree, unsigned int depth, unsigned char delta[]) { if (!tree) return; treedelta(tree->llink, depth, delta); treedelta(tree->rlink, depth, delta); if (depth < delta[tree->label]) delta[tree->label] = depth; }
238,560,226,702,049,630,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-1345
The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.
https://nvd.nist.gov/vuln/detail/CVE-2015-1345
14,342
savannah
83a95bd8c8561875b948cadd417c653dbe7ef2e2
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2
None
0
treefails (struct tree const *tree, struct trie const *fail, struct trie *recourse) { struct tree *link; if (!tree) return; treefails(tree->llink, fail, recourse); treefails(tree->rlink, fail, recourse); /* Find, in the chain of fails going back to the root, the first node that has a de...
266,410,234,267,996,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-1345
The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.
https://nvd.nist.gov/vuln/detail/CVE-2015-1345
14,343
savannah
83a95bd8c8561875b948cadd417c653dbe7ef2e2
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2
None
0
treenext (struct tree const *tree, struct trie *next[]) { if (!tree) return; treenext(tree->llink, next); treenext(tree->rlink, next); next[tree->label] = tree->trie; }
204,460,611,724,618,470,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-1345
The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.
https://nvd.nist.gov/vuln/detail/CVE-2015-1345
14,347
harfbuzz
a6a79df5fe2ed2cd307e7a991346faee164e70d9
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9
Handle malloc failture in the buffer
0
hb_buffer_destroy (hb_buffer_t *buffer) { HB_OBJECT_DO_DESTROY (buffer); hb_unicode_funcs_destroy (buffer->unicode); free (buffer->info); free (buffer->pos); free (buffer); }
139,667,113,007,239,450,000,000,000,000,000,000,000
hb-buffer.cc
296,683,657,265,868,100,000,000,000,000,000,000,000
[]
CVE-2011-0064
The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op...
https://nvd.nist.gov/vuln/detail/CVE-2011-0064
14,348
harfbuzz
a6a79df5fe2ed2cd307e7a991346faee164e70d9
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9
Handle malloc failture in the buffer
0
hb_buffer_get_direction (hb_buffer_t *buffer) { return buffer->direction; }
209,146,125,016,122,570,000,000,000,000,000,000,000
hb-buffer.cc
296,683,657,265,868,100,000,000,000,000,000,000,000
[]
CVE-2011-0064
The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op...
https://nvd.nist.gov/vuln/detail/CVE-2011-0064
14,349
harfbuzz
a6a79df5fe2ed2cd307e7a991346faee164e70d9
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9
Handle malloc failture in the buffer
0
hb_buffer_get_reference_count (hb_buffer_t *buffer) { HB_OBJECT_DO_GET_REFERENCE_COUNT (buffer); }
97,921,560,959,633,710,000,000,000,000,000,000,000
hb-buffer.cc
296,683,657,265,868,100,000,000,000,000,000,000,000
[]
CVE-2011-0064
The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op...
https://nvd.nist.gov/vuln/detail/CVE-2011-0064
14,350
harfbuzz
a6a79df5fe2ed2cd307e7a991346faee164e70d9
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9
Handle malloc failture in the buffer
0
hb_buffer_get_script (hb_buffer_t *buffer) { return buffer->script; }
307,872,008,849,091,570,000,000,000,000,000,000,000
hb-buffer.cc
296,683,657,265,868,100,000,000,000,000,000,000,000
[]
CVE-2011-0064
The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op...
https://nvd.nist.gov/vuln/detail/CVE-2011-0064
14,351
harfbuzz
a6a79df5fe2ed2cd307e7a991346faee164e70d9
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9
Handle malloc failture in the buffer
0
hb_buffer_get_unicode_funcs (hb_buffer_t *buffer) { return buffer->unicode; }
102,109,335,274,691,150,000,000,000,000,000,000,000
hb-buffer.cc
296,683,657,265,868,100,000,000,000,000,000,000,000
[]
CVE-2011-0064
The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op...
https://nvd.nist.gov/vuln/detail/CVE-2011-0064
14,352
harfbuzz
a6a79df5fe2ed2cd307e7a991346faee164e70d9
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9
Handle malloc failture in the buffer
0
hb_buffer_reference (hb_buffer_t *buffer) { HB_OBJECT_DO_REFERENCE (buffer); }
239,348,656,081,988,800,000,000,000,000,000,000,000
hb-buffer.cc
296,683,657,265,868,100,000,000,000,000,000,000,000
[]
CVE-2011-0064
The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op...
https://nvd.nist.gov/vuln/detail/CVE-2011-0064
14,353
harfbuzz
a6a79df5fe2ed2cd307e7a991346faee164e70d9
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9
Handle malloc failture in the buffer
0
hb_buffer_set_direction (hb_buffer_t *buffer, hb_direction_t direction) { buffer->direction = direction; }
199,702,388,474,071,350,000,000,000,000,000,000,000
hb-buffer.cc
296,683,657,265,868,100,000,000,000,000,000,000,000
[]
CVE-2011-0064
The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op...
https://nvd.nist.gov/vuln/detail/CVE-2011-0064
14,354
harfbuzz
a6a79df5fe2ed2cd307e7a991346faee164e70d9
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9
Handle malloc failture in the buffer
0
hb_buffer_set_script (hb_buffer_t *buffer, hb_script_t script) { buffer->script = script; }
275,574,185,326,423,240,000,000,000,000,000,000,000
hb-buffer.cc
296,683,657,265,868,100,000,000,000,000,000,000,000
[]
CVE-2011-0064
The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op...
https://nvd.nist.gov/vuln/detail/CVE-2011-0064
14,355
harfbuzz
a6a79df5fe2ed2cd307e7a991346faee164e70d9
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9
Handle malloc failture in the buffer
0
hb_buffer_set_unicode_funcs (hb_buffer_t *buffer, hb_unicode_funcs_t *unicode) { if (!unicode) unicode = &_hb_unicode_funcs_nil; hb_unicode_funcs_reference (unicode); hb_unicode_funcs_destroy (buffer->unicode); buffer->unicode = unicode; }
29,017,524,112,433,670,000,000,000,000,000,000,000
hb-buffer.cc
296,683,657,265,868,100,000,000,000,000,000,000,000
[]
CVE-2011-0064
The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted Op...
https://nvd.nist.gov/vuln/detail/CVE-2011-0064
14,356
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
check_data_region (struct tar_sparse_file *file, size_t i) { off_t size_left; if (!lseek_or_error (file, file->stat_info->sparse_map[i].offset)) return false; size_left = file->stat_info->sparse_map[i].numbytes; mv_size_left (file->stat_info->archive_file_size - file->dumped_size); while (size_left > 0)...
5,526,048,496,546,706,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,357
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
check_sparse_region (struct tar_sparse_file *file, off_t beg, off_t end) { if (!lseek_or_error (file, beg)) return false; while (beg < end) { size_t bytes_read; size_t rdsize = BLOCKSIZE < end - beg ? BLOCKSIZE : end - beg; char diff_buffer[BLOCKSIZE]; bytes_read = safe_read (file-...
222,458,617,585,500,950,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,358
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
decode_num (uintmax_t *num, char const *arg, uintmax_t maxval) { uintmax_t u; char *arg_lim; if (!ISDIGIT (*arg)) return false; errno = 0; u = strtoumax (arg, &arg_lim, 10); if (! (u <= maxval && errno != ERANGE) || *arg_lim) return false; *num = u; return true; }
63,324,700,854,714,390,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,359
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
oldgnu_add_sparse (struct tar_sparse_file *file, struct sparse *s) { struct sp_array sp; if (s->numbytes[0] == '\0') return add_finish; sp.offset = OFF_FROM_HEADER (s->offset); sp.numbytes = OFF_FROM_HEADER (s->numbytes); if (sp.offset < 0 || sp.numbytes < 0 || INT_ADD_OVERFLOW (sp.offset, sp.numby...
74,407,608,565,405,095,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,360
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
oldgnu_dump_header (struct tar_sparse_file *file) { off_t block_ordinal = current_block_ordinal (); union block *blk; size_t i; blk = start_header (file->stat_info); blk->header.typeflag = GNUTYPE_SPARSE; if (file->stat_info->sparse_map_avail > SPARSES_IN_OLDGNU_HEADER) blk->oldgnu_header.isextended = ...
245,423,478,404,266,930,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,361
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
oldgnu_get_sparse_info (struct tar_sparse_file *file) { size_t i; union block *h = current_header; int ext_p; enum oldgnu_add_status rc; file->stat_info->sparse_map_avail = 0; for (i = 0; i < SPARSES_IN_OLDGNU_HEADER; i++) { rc = oldgnu_add_sparse (file, &h->oldgnu_header.sp[i]); if (rc != ...
24,413,034,332,985,275,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,362
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
oldgnu_sparse_member_p (struct tar_sparse_file *file __attribute__ ((unused))) { return current_header->header.typeflag == GNUTYPE_SPARSE; }
275,652,842,725,951,600,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,363
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
oldgnu_store_sparse_info (struct tar_sparse_file *file, size_t *pindex, struct sparse *sp, size_t sparse_size) { for (; *pindex < file->stat_info->sparse_map_avail && sparse_size > 0; sparse_size--, sp++, ++*pindex) { OFF_TO_CHARS (file->stat_info->sparse_map[*pindex].offset, sp->offset); ...
215,810,348,784,289,800,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,364
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
pax_dump_header (struct tar_sparse_file *file) { file->stat_info->sparse_major = tar_sparse_major; file->stat_info->sparse_minor = tar_sparse_minor; return (file->stat_info->sparse_major == 0) ? pax_dump_header_0 (file) : pax_dump_header_1 (file); }
24,802,498,478,482,727,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,365
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
pax_dump_header_0 (struct tar_sparse_file *file) { off_t block_ordinal = current_block_ordinal (); union block *blk; size_t i; char nbuf[UINTMAX_STRSIZE_BOUND]; struct sp_array *map = file->stat_info->sparse_map; char *save_file_name = NULL; /* Store the real file size */ xheader_store ("GNU.sparse.siz...
41,796,229,012,369,013,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,366
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
pax_sparse_member_p (struct tar_sparse_file *file) { return file->stat_info->sparse_map_avail > 0 || file->stat_info->sparse_major > 0; }
7,279,484,723,444,561,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,367
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
pax_start_header (struct tar_stat_info *st) { off_t realsize = st->stat.st_size; union block *blk; st->stat.st_size = st->archive_file_size; blk = start_header (st); st->stat.st_size = realsize; return blk; }
180,789,592,159,917,450,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,368
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
sparse_diff_file (int fd, struct tar_stat_info *st) { bool rc = true; struct tar_sparse_file file; size_t i; off_t offset = 0; if (!tar_sparse_init (&file)) return dump_status_not_implemented; file.stat_info = st; file.fd = fd; file.seekable = true; /* File *must* be seekable for compare to work *...
8,974,954,236,323,523,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,369
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
sparse_dump_file (int fd, struct tar_stat_info *st) { bool rc; struct tar_sparse_file file; if (!tar_sparse_init (&file)) return dump_status_not_implemented; file.stat_info = st; file.fd = fd; file.seekable = true; /* File *must* be seekable for dump to work */ rc = sparse_scan_file (&file); if (...
298,479,498,932,788,030,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,370
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
sparse_dump_region (struct tar_sparse_file *file, size_t i) { union block *blk; off_t bytes_left = file->stat_info->sparse_map[i].numbytes; if (!lseek_or_error (file, file->stat_info->sparse_map[i].offset)) return false; while (bytes_left > 0) { size_t bufsize = (bytes_left > BLOCKSIZE) ? BLOCKS...
149,311,081,653,364,360,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,371
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
sparse_extract_region (struct tar_sparse_file *file, size_t i) { off_t write_size; if (!lseek_or_error (file, file->stat_info->sparse_map[i].offset)) return false; write_size = file->stat_info->sparse_map[i].numbytes; if (write_size == 0) { /* Last block of the file is a hole */ if (file-...
107,608,456,604,416,180,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,372
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
star_get_sparse_info (struct tar_sparse_file *file) { size_t i; union block *h = current_header; int ext_p; enum oldgnu_add_status rc = add_ok; file->stat_info->sparse_map_avail = 0; if (h->star_in_header.prefix[0] == '\0' && h->star_in_header.sp[0].offset[10] != '\0') { /* Old star format...
95,556,342,580,482,680,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,373
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
None
0
star_sparse_member_p (struct tar_sparse_file *file __attribute__ ((unused))) { return current_header->header.typeflag == GNUTYPE_SPARSE; }
67,249,748,667,062,760,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
14,392
ghostscript
961b10cdd71403072fb99401a45f3bef6ce53626
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626
None
0
static inline int s16(byte *p) { return (signed short)( (p[0] << 8) | p[1] ); }
331,037,985,417,771,100,000,000,000,000,000,000,000
xpsfont.c
237,740,818,077,512,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9740
The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9740
14,393
ghostscript
961b10cdd71403072fb99401a45f3bef6ce53626
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626
None
0
static inline int u16(byte *p) { return (p[0] << 8) | p[1]; }
70,313,692,716,440,670,000,000,000,000,000,000,000
xpsfont.c
237,740,818,077,512,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9740
The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9740
14,394
ghostscript
961b10cdd71403072fb99401a45f3bef6ce53626
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626
None
0
static inline int u24(byte *p) { return (p[0] << 16) | (p[1] << 8) | p[2]; }
167,238,634,167,240,260,000,000,000,000,000,000,000
xpsfont.c
237,740,818,077,512,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9740
The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9740
14,395
ghostscript
961b10cdd71403072fb99401a45f3bef6ce53626
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626
None
0
static inline int u32(byte *p) { return (p[0] << 24) | (p[1] << 16) | (p[2] << 8) | p[3]; }
164,005,817,604,969,290,000,000,000,000,000,000,000
xpsfont.c
237,740,818,077,512,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9740
The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9740
14,396
ghostscript
961b10cdd71403072fb99401a45f3bef6ce53626
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626
None
0
xps_count_font_encodings(xps_font_t *font) { return font->cmapsubcount; }
62,738,717,690,887,720,000,000,000,000,000,000,000
xpsfont.c
237,740,818,077,512,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9740
The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9740
14,397
ghostscript
961b10cdd71403072fb99401a45f3bef6ce53626
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626
None
0
xps_find_sfnt_table(xps_font_t *font, const char *name, int *lengthp) { int offset; int ntables; int i; if (font->length < 12) return -1; if (!memcmp(font->data, "ttcf", 4)) { int nfonts = u32(font->data + 8); if (font->subfontid < 0 || font->subfontid >= nfonts) ...
149,369,545,525,733,000,000,000,000,000,000,000,000
xpsfont.c
237,740,818,077,512,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9740
The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9740
14,398
ghostscript
961b10cdd71403072fb99401a45f3bef6ce53626
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626
None
0
xps_load_sfnt_name(xps_font_t *font, char *namep, const int buflen) { byte *namedata; int offset, length; /*int format;*/ int count, stringoffset; int found; int i, k; found = 0; strcpy(namep, "Unknown"); offset = xps_find_sfnt_table(font, "name", &length); if (offset < 0 || le...
325,261,375,591,148,470,000,000,000,000,000,000,000
xpsfont.c
237,740,818,077,512,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9740
The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9740
14,399
ghostscript
961b10cdd71403072fb99401a45f3bef6ce53626
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626
None
0
xps_new_font(xps_context_t *ctx, byte *buf, int buflen, int index) { xps_font_t *font; int code; font = xps_alloc(ctx, sizeof(xps_font_t)); if (!font) { gs_throw(gs_error_VMerror, "out of memory"); return NULL; } font->data = buf; font->length = buflen; font->font =...
136,363,984,996,029,400,000,000,000,000,000,000,000
xpsfont.c
237,740,818,077,512,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9740
The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9740
14,400
ghostscript
961b10cdd71403072fb99401a45f3bef6ce53626
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626
None
0
xps_select_font_encoding(xps_font_t *font, int idx) { byte *cmapdata, *entry; int pid, eid; if (idx < 0 || idx >= font->cmapsubcount) return 0; cmapdata = font->data + font->cmaptable; entry = cmapdata + 4 + idx * 8; pid = u16(entry + 0); eid = u16(entry + 2); font->cmapsubtable ...
130,047,091,764,416,350,000,000,000,000,000,000,000
xpsfont.c
198,373,143,573,959,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9740
The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9740
14,401
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static Bool Calc_Length( EXEC_OP ) { CUR.opcode = CUR.code[CUR.IP]; switch ( CUR.opcode ) { case 0x40: if ( CUR.IP + 1 >= CUR.codeSize ) return FAILURE; CUR.length = CUR.code[CUR.IP + 1] + 2; break; case 0x41: if ( CUR.IP + 1 >= CUR.codeSize ) return F...
112,577,454,586,979,860,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,402
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Compute_Funcs( EXEC_OP ) { if ( CUR.GS.freeVector.x == 0x4000 ) { CUR.func_freeProj = (TProject_Function)Project_x; CUR.F_dot_P = CUR.GS.projVector.x * 0x10000L; } else { if ( CUR.GS.freeVector.y == 0x4000 ) { CUR.func_freeProj = (TProject_Funct...
232,893,983,865,036,170,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,403
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static Bool Compute_Point_Displacement( EXEC_OPS PCoordinates x, PCoordinates y, PGlyph_Zone zone, Int* refp ) { TGlyph_Zone ...
287,882,677,423,104,730,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,404
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Compute_Round( EXEC_OPS Byte round_mode ) { switch ( round_mode ) { case TT_Round_Off: CUR.func_round = (TRound_Function)Round_None; break; case TT_Round_To_Grid: CUR.func_round = (TRound_Function)Round_To_Grid; break; case TT_Round_Up_To_Grid: CUR.f...
7,484,615,955,509,031,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,405
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static Long Current_Ratio( EXEC_OP ) { if ( CUR.metrics.ratio ) return CUR.metrics.ratio; if ( CUR.GS.projVector.y == 0 ) CUR.metrics.ratio = CUR.metrics.x_ratio; else if ( CUR.GS.projVector.x == 0 ) CUR.metrics.ratio = CUR.metrics.y_ratio; else { Long x, y; x...
270,235,289,471,057,770,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,406
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Direct_Move( EXEC_OPS PGlyph_Zone zone, Int point, TT_F26Dot6 distance ) { TT_F26Dot6 v; v = CUR.GS.freeVector.x; if ( v != 0 ) { zone->cur_x[point] += MulDiv_Round( distance, ...
129,869,091,916,840,900,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,407
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Direct_Move_X( EXEC_OPS PGlyph_Zone zone, Int point, TT_F26Dot6 distance ) { (void)exc; zone->cur_x[point] += distance; zone->touch[point] |= TT_Flag_Touched_X; }
287,242,273,403,862,500,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,408
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Direct_Move_Y( EXEC_OPS PGlyph_Zone zone, Int point, TT_F26Dot6 distance ) { (void)exc; zone->cur_y[point] += distance; zone->touch[point] |= TT_Flag_Touched_Y; }
166,915,658,342,818,800,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,409
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static TT_F26Dot6 Dual_Project( EXEC_OPS TT_F26Dot6 Vx, TT_F26Dot6 Vy ) { THROW_PATENTED; return 0; }
130,892,856,462,500,460,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,410
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static TT_F26Dot6 FUnits_To_Pixels( EXEC_OPS Int distance ) { return MulDiv_Round( distance, CUR.metrics.scale1, CUR.metrics.scale2 ); }
181,243,311,668,467,650,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,411
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static TT_F26Dot6 Free_Project( EXEC_OPS TT_F26Dot6 Vx, TT_F26Dot6 Vy ) { THROW_PATENTED; return 0; }
251,159,287,294,344,170,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,412
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static Short GetShortIns( EXEC_OP ) { /* Reading a byte stream so there is no endianess (DaveP) */ CUR.IP += 2; return ( CUR.code[CUR.IP-2] << 8) + CUR.code[CUR.IP-1]; }
43,953,055,151,561,110,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,413
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_AA( INS_ARG ) { (void)exc; (void)args; /* Intentional - no longer supported */ }
316,334,211,290,102,700,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,414
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_ABS( INS_ARG ) { (void)exc; args[0] = ABS( args[0] ); }
139,994,646,317,824,520,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,415
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_ADD( INS_ARG ) { (void)exc; args[0] += args[1]; }
248,310,338,118,490,750,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,416
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_ALIGNPTS( INS_ARG ) { Int p1, p2; TT_F26Dot6 distance; p1 = (Int)args[0]; p2 = (Int)args[1]; if ( BOUNDS( args[0], CUR.zp1.n_points ) || BOUNDS( args[1], CUR.zp0.n_points ) ) { CUR.error = TT_Err_Invalid_Reference; return; } distance =...
5,641,549,676,838,549,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,417
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_ALIGNRP( INS_ARG ) { Int point; TT_F26Dot6 distance; (void)args; if ( CUR.top < CUR.GS.loop ) { CUR.error = TT_Err_Invalid_Reference; return; } while ( CUR.GS.loop > 0 ) { CUR.args--; point = (Int)CUR.stack[CUR.args]; if ( B...
301,253,683,469,405,050,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,418
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_AND( INS_ARG ) { (void)exc; if ( args[0] != 0 && args[1] != 0 ) args[0] = 1; else args[0] = 0; }
208,428,179,294,701,700,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,419
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_CALL( INS_ARG ) { PCallRecord pCrec; if ( BOUNDS( args[0], CUR.numFDefs ) || !CUR.FDefs[args[0]].Active ) { CUR.error = TT_Err_Invalid_Reference; return; } if ( CUR.callTop >= CUR.callSize ) { CUR.error = TT_Err_Stack_Overflow; return; } D...
56,048,214,110,338,380,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,420
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_CEILING( INS_ARG ) { (void)exc; args[0] = (args[0] + 63) & (-64); }
142,876,912,607,697,730,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,421
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_CINDEX( INS_ARG ) { Long L; L = args[0]; if ( L<0 || L > CUR.args ) CUR.error = TT_Err_Invalid_Reference; else args[0] = CUR.stack[CUR.args - L]; }
147,734,490,619,761,320,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,422
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_CLEAR( INS_ARG ) { (void)args; CUR.new_top = 0; }
59,307,315,405,978,210,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,423
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_DEBUG( INS_ARG ) { (void)args; CUR.error = TT_Err_Debug_OpCode; }
120,553,848,060,043,000,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,424
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_DELTAC( INS_ARG ) { Long nump, k; Long A, B, C; nump = args[0]; for ( k = 1; k <= nump; k++ ) { if ( CUR.args < 2 ) { CUR.error = TT_Err_Too_Few_Arguments; return; } CUR.args -= 2; A = CUR.stack[CUR.args + 1]; B = CUR.sta...
206,935,054,898,363,340,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,425
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_DELTAP( INS_ARG ) { Int k; Long A, B, C, nump; nump = args[0]; for ( k = 1; k <= nump; k++ ) { if ( CUR.args < 2 ) { CUR.error = TT_Err_Too_Few_Arguments; return; } CUR.args -= 2; A = CUR.stack[CUR.args + 1]; B = CUR.sta...
76,473,349,090,415,380,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,426
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_DEPTH( INS_ARG ) { args[0] = CUR.top; }
57,053,433,026,326,345,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,427
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_DIV( INS_ARG ) { if ( args[1] == 0 ) { CUR.error = TT_Err_Divide_By_Zero; return; } args[0] = MulDiv_Round( args[0], 64L, args[1] ); DBG_PRINT1(" %d", args[0]); }
233,533,966,853,551,100,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,428
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_DUP( INS_ARG ) { (void)exc; args[1] = args[0]; }
51,499,664,176,492,940,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,429
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_EIF( INS_ARG ) { (void)exc; (void)args; /* nothing to do */ }
331,431,245,235,897,170,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,430
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_ELSE( INS_ARG ) { Int nIfs; (void)args; nIfs = 1; do { if ( SKIP_Code() == FAILURE ) return; switch ( CUR.opcode ) { case 0x58: /* IF */ nIfs++; break; case 0x59: /* EIF */ nIfs--; break; } ...
55,773,617,842,796,010,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,431
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_ENDF( INS_ARG ) { PCallRecord pRec; (void)args; if ( CUR.callTop <= 0 ) /* We encountered an ENDF without a call */ { CUR.error = TT_Err_ENDF_In_Exec_Stream; return; } CUR.callTop--; pRec = &CUR.callStack[CUR.callTop]; pRec->Cur_Count--; CU...
123,825,729,373,029,680,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,432
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_EQ( INS_ARG ) { (void)exc; if ( args[0] == args[1] ) args[0] = 1; else args[0] = 0; }
35,322,659,608,240,854,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,433
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_EVEN( INS_ARG ) { if ( (CUR_Func_round( args[0], 0L ) & 127) == 0 ) args[0] = 1; else args[0] = 0; }
24,172,464,422,358,355,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,434
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_FDEF( INS_ARG ) { PDefRecord pRec; if ( BOUNDS( args[0], CUR.numFDefs ) ) { CUR.error = TT_Err_Invalid_Reference; return; } pRec = &CUR.FDefs[args[0]]; pRec->Range = CUR.curRange; pRec->Opc = (Byte)(args[0]); pRec->Start = CUR.IP + 1; pRec->A...
95,630,302,802,270,960,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,435
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_FLIPOFF( INS_ARG ) { (void)args; CUR.GS.auto_flip = FALSE; }
15,854,285,820,354,400,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,436
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_FLIPON( INS_ARG ) { (void)args; CUR.GS.auto_flip = TRUE; }
275,407,057,814,495,600,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,437
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_FLIPRGON( INS_ARG ) { Long I, K, L; K = args[1]; L = args[0]; if ( BOUNDS( K, CUR.pts.n_points ) || BOUNDS( L, CUR.pts.n_points ) ) { CUR.error = TT_Err_Invalid_Reference; return; } for ( I = L; I <= K; I++ ) CUR.pts.touch[I] |= TT_Flag_On_...
155,224,313,175,218,380,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,438
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_FLOOR( INS_ARG ) { (void)exc; args[0] &= -64; }
277,880,419,403,934,000,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,439
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_GC( INS_ARG ) { Long L; L = args[0]; if ( BOUNDS( L, CUR.zp2.n_points ) ) { CUR.error = TT_Err_Invalid_Reference; return; } switch ( CUR.opcode & 1 ) { case 0: L = CUR_Func_project( CUR.zp2.cur_x[L], CUR.zp2.cur_y[L] ...
301,480,656,963,225,260,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,440
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_GFV( INS_ARG ) { args[0] = CUR.GS.freeVector.x; args[1] = CUR.GS.freeVector.y; }
115,739,652,296,497,200,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,441
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_GPV( INS_ARG ) { args[0] = CUR.GS.projVector.x; args[1] = CUR.GS.projVector.y; }
222,441,896,574,937,430,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,442
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_GT( INS_ARG ) { (void)exc; if ( args[0] > args[1] ) args[0] = 1; else args[0] = 0; }
332,062,630,633,343,870,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,443
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_GTEQ( INS_ARG ) { (void)exc; if ( args[0] >= args[1] ) args[0] = 1; else args[0] = 0; }
331,403,327,419,854,730,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,444
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static Bool Ins_Goto_CodeRange( EXEC_OPS Int aRange, Int aIP ) { TCodeRange* WITH; if ( aRange < 1 || aRange > 3 ) { CUR.error = TT_Err_Bad_Argument; return FAILURE; } WITH = &CUR.codeRangeTable[aRange - 1]; if ( WITH->Base == NULL ) /* invalid coderange */ { ...
312,088,440,994,411,600,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,445
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_IDEF( INS_ARG ) { if (CUR.countIDefs >= CUR.numIDefs || args[0] > 255) CUR.error = TT_Err_Storage_Overflow; else { PDefRecord pTDR; CUR.IDefPtr[(Byte)(args[0])] = CUR.countIDefs; pTDR = &CUR.IDefs[CUR.countIDefs++]; pTDR->Opc = (Byte)(args[0...
245,046,248,932,865,030,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,446
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_IF( INS_ARG ) { Int nIfs; Bool Out; if ( args[0] != 0 ) return; nIfs = 1; Out = 0; do { if ( SKIP_Code() == FAILURE ) return; switch ( CUR.opcode ) { case 0x58: /* IF */ nIfs++; break; case 0x1b: ...
84,900,707,593,551,900,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,447
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_INSTCTRL( INS_ARG ) { Long K, L; K = args[1]; L = args[0]; if ( K < 0 || K > 3 ) { CUR.error = TT_Err_Invalid_Reference; return; } CUR.GS.instruct_control = (Int)((CUR.GS.instruct_control & (~K)) | (L & K)); }
295,668,471,617,596,670,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,448
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_IP( INS_ARG ) { TT_F26Dot6 org_a, org_b, org_x, cur_a, cur_b, cur_x, distance; Int point; (void)args; if ( CUR.top < CUR.GS.loop || BOUNDS(CUR.GS.rp1, CUR.zp0.n_points) || BOUNDS(CUR.GS.rp2, CUR.zp1.n_points)) { C...
182,601,607,540,285,200,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,449
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_ISECT( INS_ARG ) { Long point, /* are these Ints or Longs? */ a0, a1, b0, b1; TT_F26Dot6 discriminant; TT_F26Dot6 dx, dy, dax, day, dbx, dby; TT_F26Dot6 val; TT_Vector R; point = args[0]; a0 = arg...
82,181,783,434,404,970,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,450
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_IUP( INS_ARG ) { struct LOC_Ins_IUP V; unsigned char mask; Long first_point; /* first point of contour */ Long end_point; /* end point (last+1) of contour */ Long first_touched; /* first touched point in contour */ Long cur_touched; /* current touch...
22,162,722,561,741,580,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,451
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_JROT( INS_ARG ) { if ( args[1] != 0 ) { CUR.IP += (Int)(args[0]); CUR.step_ins = FALSE; /* See JMPR below */ if(CUR.IP > CUR.codeSize || (CUR.code[CUR.IP] != 0x2D && CUR.code[CUR.IP - 1] == 0x2D)) CUR.IP -= 1; } }
262,916,535,602,627,030,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,452
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_LOOPCALL( INS_ARG ) { PCallRecord pTCR; if ( BOUNDS( args[1], CUR.numFDefs ) || !CUR.FDefs[args[1]].Active ) { CUR.error = TT_Err_Invalid_Reference; return; } if ( CUR.callTop >= CUR.callSize ) { CUR.error = TT_Err_Stack_Overflow; return; } ...
105,670,859,021,685,040,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,453
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_LT( INS_ARG ) { (void)exc; if ( args[0] < args[1] ) args[0] = 1; else args[0] = 0; }
137,999,184,880,285,700,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,454
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_LTEQ( INS_ARG ) { (void)exc; if ( args[0] <= args[1] ) args[0] = 1; else args[0] = 0; }
138,626,552,672,208,180,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,455
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_MAX( INS_ARG ) { (void)exc; if ( args[1] > args[0] ) args[0] = args[1]; }
114,277,236,983,453,770,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,456
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_MD( INS_ARG ) { Long K, L; TT_F26Dot6 D; K = args[1]; L = args[0]; if( BOUNDS( args[0], CUR.zp2.n_points ) || BOUNDS( args[1], CUR.zp1.n_points ) ) { CUR.error = TT_Err_Invalid_Reference; return; } if ( CUR.opcode & 1 ) D = CUR_Func...
186,050,444,122,027,660,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,457
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_MDRP( INS_ARG ) { Int point; TT_F26Dot6 distance, org_dist; point = (Int)args[0]; if ( BOUNDS( args[0], CUR.zp1.n_points ) || BOUNDS( CUR.GS.rp0, CUR.zp0.n_points) ) { /* Current version of FreeType silently ignores this out of bounds ...
286,795,312,573,774,330,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,458
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_MIAP( INS_ARG ) { Int cvtEntry, point; TT_F26Dot6 distance, org_dist; cvtEntry = (Int)args[1]; point = (Int)args[0]; if ( BOUNDS( args[0], CUR.zp0.n_points ) || BOUNDS( args[1], CUR.cvtSize ) ) { /* Ignore these errors, abo...
58,001,255,515,255,560,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739
14,459
ghostscript
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
None
0
static void Ins_MIN( INS_ARG ) { (void)exc; if ( args[1] < args[0] ) args[0] = args[1]; }
41,310,686,306,388,196,000,000,000,000,000,000,000
ttinterp.c
3,055,912,626,797,426,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9739
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9739