Vulnerability Description
An integer overflow vulnerability was observed in the regemit function in regexp.c in Artifex Software, Inc. MuJS before fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045. The attack requires a regular expression with nested repetition. A successful exploitation of this issue can lead to code execution or a denial of service (buffer overflow) condition.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Artifex | Mujs | < 2017-01-12 |
Related Weaknesses (CWE)
References
- http://git.ghostscript.com/?p=mujs.git%3Bh=fa3d30fd18c348bb4b1f3858fb860f4fcd4b2
- http://www.securityfocus.com/bid/95876Third Party AdvisoryVDB Entry
- https://bugs.ghostscript.com/show_bug.cgi?id=697448Issue Tracking
- http://git.ghostscript.com/?p=mujs.git%3Bh=fa3d30fd18c348bb4b1f3858fb860f4fcd4b2
- http://www.securityfocus.com/bid/95876Third Party AdvisoryVDB Entry
- https://bugs.ghostscript.com/show_bug.cgi?id=697448Issue Tracking
FAQ
What is CVE-2016-10141?
CVE-2016-10141 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An integer overflow vulnerability was observed in the regemit function in regexp.c in Artifex Software, Inc. MuJS before fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045. The attack requires a regular express...
How severe is CVE-2016-10141?
CVE-2016-10141 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-10141?
Check the references section above for vendor advisories and patch information. Affected products include: Artifex Mujs.