{"id":"CVE-2016-8729","details":"An exploitable memory corruption vulnerability exists in the JBIG2 parser of Artifex MuPDF 1.9. A specially crafted PDF can cause a negative number to be passed to a memset resulting in memory corruption and potential code execution. An attacker can specially craft a PDF and send to the victim to trigger this vulnerability.","modified":"2026-04-10T03:53:53.083843Z","published":"2018-04-24T19:29:00.487Z","related":["openSUSE-SU-2024:11068-1"],"references":[{"type":"WEB","url":"https://bugs.ghostscript.com/show_bug.cgi?id=697395"},{"type":"WEB","url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/jbig2dec.git/commit/?id=e698d5c11d27212aa1098bc5b1673a3378563092"},{"type":"WEB","url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=1a7ef61410884daff8ff8391ddcecc3102acd989"},{"type":"ADVISORY","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0243"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/artifexsoftware/mupdf","events":[{"introduced":"0"},{"last_affected":"027860688eafc89ca3d57937a77a43a9bb96f590"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.9"}]}}],"versions":["0.1","0.2","0.3","0.4","0.5","0.6","0.7","0.8","0.9","1.0","1.0rc1","1.1-forms-tech-preview","1.2","1.3rc1","1.4","1.4-ios","1.5","1.5-ios","1.5-ios-appstore","1.5-ios-rc6","1.5-ios-rc7","1.5-ios-rc8","1.6","1.6-appstore","1.6-ios-rc1","1.6-ios-rc2","1.7","1.7-rc1","1.7a","1.8","1.9","1.9-rc1","1.9-rc2","1.9a","android-release-60"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-8729.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}