PatchSiren cyber security CVE debrief
CVE-2016-8389 Iceni CVE debrief
CVE-2016-8389 is a high-severity integer-overflow vulnerability in Iceni Argus 6.6.04. When Argus processes a malformed PDF during PDF-to-XML conversion, it can mis-handle font-to-polygon rasterization and write outside the bounds of an internal buffer. The issue was publicly recorded by CVE/NVD on 2017-02-28 and remains relevant for any environment that opens untrusted PDFs with the affected software.
- Vendor
- Iceni
- Product
- CVE-2016-8389
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-28
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-28
- Advisory updated
- 2026-05-13
Who should care
Organizations and users running Iceni Argus 6.6.04, especially workflow systems or desktop environments that process untrusted or externally supplied PDFs. Security teams should pay particular attention where Argus is used in automated document conversion pipelines.
Technical summary
NVD classifies the flaw as CWE-190 (integer overflow) with CVSS 3.1 vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The supplied description indicates that malformed PDF input can trigger incorrect iteration and polygon-buffer initialization during conversion, resulting in an out-of-bounds write. The expected impact is potential code execution in the context of the account running the application.
Defensive priority
High
Recommended defensive actions
- Confirm whether Iceni Argus 6.6.04 is deployed anywhere in production, workstations, or document-processing services.
- Restrict processing of untrusted PDFs until the affected version is patched or removed from service.
- Apply the vendor or product update referenced by the official CVE/NVD record if available in your environment.
- If Argus must remain in use, isolate it in a least-privilege, tightly contained execution environment.
- Add monitoring and file-handling controls around PDF ingestion workflows to reduce exposure to malicious documents.
- Review downstream automation that converts PDFs to XML, since the vulnerable behavior is triggered during that processing path.
Evidence notes
The vulnerability description supplied with the CVE states that malformed PDF conversion can trigger an integer overflow and an out-of-bounds buffer write in Iceni Argus. NVD lists the affected CPE as iceni:argus version 6.6.04 and maps the weakness to CWE-190. NVD also records the issue as CVSS 7.8 High with local attack vector and required user interaction. References in the NVD record include the CVE entry, NVD detail page, and a Talos advisory reference labeled as an exploit/third-party advisory.
Official resources
-
CVE-2016-8389 CVE record
CVE.org
-
CVE-2016-8389 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Broken Link, Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Exploit, Third Party Advisory, VDB Entry
Publicly disclosed in the CVE/NVD record on 2017-02-28; NVD metadata was last modified on 2026-05-13.