PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-8385 Iceni CVE debrief

CVE-2016-8385 is a HIGH-severity memory corruption issue in Iceni Argus. When the tool converts a malformed PDF to XML, an uninitialized stack variable can later be used as a length for a copy operation, which may write past the bounds of a stack buffer used for color data. The result can be code execution in the context of the account running the tool.

Vendor
Iceni
Product
CVE-2016-8385
CVSS
HIGH 7.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-27
Original CVE updated
2026-05-13
Advisory published
2017-02-27
Advisory updated
2026-05-13

Who should care

Teams that use Iceni Argus 6.6.04 to process PDFs, especially environments that convert untrusted or externally supplied documents as part of automated workflows or batch jobs.

Technical summary

The supplied NVD record maps the issue to Iceni Argus 6.6.04 and CWE-787 (out-of-bounds write). The vulnerability is triggered during malformed PDF to XML conversion, where a stack variable may remain uninitialized and later influence a length value used in a copy operation. That can produce a stack-based buffer overflow affecting a buffer used for color handling. NVD lists CVSS v3.1 7.8/HIGH with local access, low attack complexity, no privileges required, and user interaction required.

Defensive priority

High for any organization that still runs the affected Argus version or accepts untrusted PDFs into its conversion pipeline. Priority is highest where the software processes third-party files or operates with elevated privileges.

Recommended defensive actions

  • Inventory deployments of Iceni Argus and confirm whether version 6.6.04 is in use.
  • Restrict or disable processing of untrusted PDFs until the software is updated or replaced.
  • Run document conversion tasks with least privilege and in isolated environments where possible.
  • Apply the vendor's fixed release if available, or migrate to a supported alternative.
  • Monitor for crashes or anomalous behavior during PDF-to-XML conversion, especially on malformed inputs.

Evidence notes

This debrief is based on the supplied CVE description and the official NVD record. The NVD metadata identifies Iceni Argus 6.6.04 as vulnerable and classifies the weakness as CWE-787. References in the source item include a Cisco Talos advisory (TALOS-2016-0210) and a SecurityFocus BID entry; the SecurityFocus link is marked broken in the source corpus. No exploit steps or unsupported remediation claims are included.

Official resources

CVE published on 2017-02-27 and last modified on 2026-05-13, per the supplied timeline and NVD source metadata.