PatchSiren cyber security CVE debrief
CVE-2016-8385 Iceni CVE debrief
CVE-2016-8385 is a HIGH-severity memory corruption issue in Iceni Argus. When the tool converts a malformed PDF to XML, an uninitialized stack variable can later be used as a length for a copy operation, which may write past the bounds of a stack buffer used for color data. The result can be code execution in the context of the account running the tool.
- Vendor
- Iceni
- Product
- CVE-2016-8385
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-27
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-27
- Advisory updated
- 2026-05-13
Who should care
Teams that use Iceni Argus 6.6.04 to process PDFs, especially environments that convert untrusted or externally supplied documents as part of automated workflows or batch jobs.
Technical summary
The supplied NVD record maps the issue to Iceni Argus 6.6.04 and CWE-787 (out-of-bounds write). The vulnerability is triggered during malformed PDF to XML conversion, where a stack variable may remain uninitialized and later influence a length value used in a copy operation. That can produce a stack-based buffer overflow affecting a buffer used for color handling. NVD lists CVSS v3.1 7.8/HIGH with local access, low attack complexity, no privileges required, and user interaction required.
Defensive priority
High for any organization that still runs the affected Argus version or accepts untrusted PDFs into its conversion pipeline. Priority is highest where the software processes third-party files or operates with elevated privileges.
Recommended defensive actions
- Inventory deployments of Iceni Argus and confirm whether version 6.6.04 is in use.
- Restrict or disable processing of untrusted PDFs until the software is updated or replaced.
- Run document conversion tasks with least privilege and in isolated environments where possible.
- Apply the vendor's fixed release if available, or migrate to a supported alternative.
- Monitor for crashes or anomalous behavior during PDF-to-XML conversion, especially on malformed inputs.
Evidence notes
This debrief is based on the supplied CVE description and the official NVD record. The NVD metadata identifies Iceni Argus 6.6.04 as vulnerable and classifies the weakness as CWE-787. References in the source item include a Cisco Talos advisory (TALOS-2016-0210) and a SecurityFocus BID entry; the SecurityFocus link is marked broken in the source corpus. No exploit steps or unsupported remediation claims are included.
Official resources
-
CVE-2016-8385 CVE record
CVE.org
-
CVE-2016-8385 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Broken Link, Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Exploit, Third Party Advisory, VDB Entry
CVE published on 2017-02-27 and last modified on 2026-05-13, per the supplied timeline and NVD source metadata.