PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-8389 Iceni CVE debrief

CVE-2016-8389 is a high-severity integer-overflow vulnerability in Iceni Argus 6.6.04. When Argus processes a malformed PDF during PDF-to-XML conversion, it can mis-handle font-to-polygon rasterization and write outside the bounds of an internal buffer. The issue was publicly recorded by CVE/NVD on 2017-02-28 and remains relevant for any environment that opens untrusted PDFs with the affected software.

Vendor
Iceni
Product
CVE-2016-8389
CVSS
HIGH 7.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-28
Original CVE updated
2026-05-13
Advisory published
2017-02-28
Advisory updated
2026-05-13

Who should care

Organizations and users running Iceni Argus 6.6.04, especially workflow systems or desktop environments that process untrusted or externally supplied PDFs. Security teams should pay particular attention where Argus is used in automated document conversion pipelines.

Technical summary

NVD classifies the flaw as CWE-190 (integer overflow) with CVSS 3.1 vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The supplied description indicates that malformed PDF input can trigger incorrect iteration and polygon-buffer initialization during conversion, resulting in an out-of-bounds write. The expected impact is potential code execution in the context of the account running the application.

Defensive priority

High

Recommended defensive actions

  • Confirm whether Iceni Argus 6.6.04 is deployed anywhere in production, workstations, or document-processing services.
  • Restrict processing of untrusted PDFs until the affected version is patched or removed from service.
  • Apply the vendor or product update referenced by the official CVE/NVD record if available in your environment.
  • If Argus must remain in use, isolate it in a least-privilege, tightly contained execution environment.
  • Add monitoring and file-handling controls around PDF ingestion workflows to reduce exposure to malicious documents.
  • Review downstream automation that converts PDFs to XML, since the vulnerable behavior is triggered during that processing path.

Evidence notes

The vulnerability description supplied with the CVE states that malformed PDF conversion can trigger an integer overflow and an out-of-bounds buffer write in Iceni Argus. NVD lists the affected CPE as iceni:argus version 6.6.04 and maps the weakness to CWE-190. NVD also records the issue as CVSS 7.8 High with local attack vector and required user interaction. References in the NVD record include the CVE entry, NVD detail page, and a Talos advisory reference labeled as an exploit/third-party advisory.

Official resources

Publicly disclosed in the CVE/NVD record on 2017-02-28; NVD metadata was last modified on 2026-05-13.