An exploitable uninitialized variable vulnerability which leads to a stack-based buffer overflow exists in Iceni Argus. When it attempts to convert a malformed PDF to XML a stack variable will be left uninitialized which will later be used to fetch a length that is used in a copy operation. In most cases this will allow an aggressor to write outside the bounds of a stack buffer which is used to contain colors. This can lead to code execution under the context of the account running the tool.
References
Link Resource
http://www.securityfocus.com/bid/96472 Broken Link Third Party Advisory VDB Entry
http://www.talosintelligence.com/reports/TALOS-2016-0210/ Exploit Third Party Advisory VDB Entry
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: talos

Published: 2017-02-27T21:00:00

Updated: 2022-04-19T19:16:29

Reserved: 2016-09-29T00:00:00


Link: CVE-2016-8385

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-02-27T21:59:00.147

Modified: 2022-12-13T21:17:47.433


Link: CVE-2016-8385

JSON object: View

cve-icon Redhat Information

No data.

CWE