CVE-2009-0196

NameCVE-2009-0196
DescriptionHeap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2080-1, DTSA-198-1
Debian Bugs524803, 561717

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ghostscript (PTS)buster9.27~dfsg-2+deb10u5fixed
buster (security)9.27~dfsg-2+deb10u9fixed
bullseye9.53.3~dfsg-7+deb11u6fixed
bullseye (security)9.53.3~dfsg-7+deb11u5fixed
bookworm, bookworm (security)10.0.0~dfsg-11+deb12u3fixed
sid, trixie10.02.1~dfsg-3fixed
jbig2dec (PTS)buster0.16-1+deb10u1fixed
bullseye0.19-2fixed
bookworm0.19-3fixed
sid, trixie0.20-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ghostscriptsourcelenny8.62.dfsg.1-3.2lenny4DSA-2080-1
ghostscriptsourcesqueeze8.64~dfsg-1+squeeze1DTSA-198-1
ghostscriptsource(unstable)8.64~dfsg-1.1medium524803
gs-gplsource(unstable)(unfixed)medium561717
jbig2decsource(unstable)(not affected)

Notes

- jbig2dec <not-affected> (already fixed in initial upload)

Search for package or bug name: Reporting problems