CVE-2009-0196

NameCVE-2009-0196
DescriptionHeap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2080-1, DTSA-198-1
Debian Bugs524803, 561717

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ghostscript (PTS)buster9.27~dfsg-2+deb10u5fixed
buster (security)9.27~dfsg-2+deb10u6fixed
bullseye (security), bullseye9.53.3~dfsg-7+deb11u2fixed
bookworm10.0.0~dfsg-9fixed
sid10.0.0~dfsg-10fixed
jbig2dec (PTS)buster0.16-1+deb10u1fixed
bullseye0.19-2fixed
bookworm, sid0.19-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ghostscriptsourcelenny8.62.dfsg.1-3.2lenny4DSA-2080-1
ghostscriptsourcesqueeze8.64~dfsg-1+squeeze1DTSA-198-1
ghostscriptsource(unstable)8.64~dfsg-1.1medium524803
gs-gplsource(unstable)(unfixed)medium561717
jbig2decsource(unstable)(not affected)

Notes

- jbig2dec <not-affected> (already fixed in initial upload)

Search for package or bug name: Reporting problems