PatchSiren cyber security CVE debrief
CVE-2017-6196 Artifex CVE debrief
CVE-2017-6196 is a Ghostscript memory-safety flaw in gx_image_enum_begin() that can trigger multiple use-after-free conditions when processing a crafted PostScript document. The practical impact described by the record is application crash/denial of service, with the possibility of unspecified additional impact. NVD rates the issue HIGH (CVSS 7.8).
- Vendor
- Artifex
- Product
- CVE-2017-6196
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-24
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-24
- Advisory updated
- 2026-05-13
Who should care
Administrators and vendors that ship or embed Ghostscript, especially systems that process untrusted PostScript or related print/PDF conversion inputs. Security teams should also care if Ghostscript is exposed in server-side document pipelines, viewer/conversion services, or packaged desktop tooling.
Technical summary
The NVD record identifies CWE-416 (use-after-free) in base/gxipixel.c, specifically in gx_image_enum_begin(). The vulnerable range is tied to Ghostscript builds before the referenced upstream fix commit ecceafe3abba2714ef9b432035fe0739d9b1a283. The CVE description says the issue can be triggered by a crafted PostScript document. NVD’s CVSS vector is AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, which indicates user interaction is required and the exploitability context is constrained differently than the prose description’s “remote attackers” wording; both are present in the official record.
Defensive priority
High for any environment that processes untrusted PostScript or ships Ghostscript. The combination of memory corruption, user interaction, and file-processing exposure makes this worth prioritizing for patching and package updates, especially in internet-facing or shared document workflows.
Recommended defensive actions
- Update Ghostscript to a version that includes the upstream fix referenced by commit ecceafe3abba2714ef9b432035fe0739d9b1a283.
- Inventory where Ghostscript is used directly or indirectly, including printers, converters, previewers, and document-processing services.
- Restrict or sandbox Ghostscript processing of untrusted documents until patched.
- Treat crafted PostScript as untrusted input and block or quarantine suspicious inbound files.
- Verify downstream vendor packages and advisories for backported fixes, especially if using distro-provided Ghostscript builds.
Evidence notes
Primary evidence comes from the NVD CVE record and its cited references. The record names multiple use-after-free vulnerabilities in gx_image_enum_begin() in base/gxipixel.c and points to the upstream Ghostscript commit ecceafe3abba2714ef9b432035fe0739d9b1a283, the Ghostscript bug tracker entry 697596 marked as issue tracking/patch, and the Gentoo GLSA advisory. The official NVD metadata also classifies the weakness as CWE-416 and assigns CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H.
Official resources
-
CVE-2017-6196 CVE record
CVE.org
-
CVE-2017-6196 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch
- Source reference
CVE published 2017-02-24. The supplied official record was modified on 2026-05-13; that modified date reflects database updates, not the original vulnerability disclosure date.