Medium severity5.5NVD Advisory· Published May 23, 2017· Updated May 13, 2026
CVE-2016-7977
CVE-2016-7977
Description
Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- www.openwall.com/lists/oss-security/2016/09/29/28nvdMailing ListPatch
- www.openwall.com/lists/oss-security/2016/10/05/15nvdMailing ListPatch
- bugs.ghostscript.com/show_bug.cginvdIssue TrackingPatch
- www.securityfocus.com/bid/95334nvdThird Party AdvisoryVDB Entry
- ghostscript.com/doc/9.21/History9.htmnvdRelease Notes
- git.ghostscript.comnvd
- rhn.redhat.com/errata/RHSA-2017-0013.htmlnvd
- rhn.redhat.com/errata/RHSA-2017-0014.htmlnvd
- www.debian.org/security/2016/dsa-3691nvd
- www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlnvd
- security.gentoo.org/glsa/201702-31nvd
News mentions
0No linked articles in our index yet.