Jump to content

Advisories MDVSA-2010:134: ghostscript


paul
 Share

Recommended Posts

Multiple vulnerabilities has been found and corrected in ghostscript:

 

Stack-based buffer overflow in the errprintf function in base/gsmisc.c

in ghostscript 8.64 through 8.70 allows remote attackers to cause a

denial of service (crash) and possibly execute arbitrary code via a

crafted PDF file, as originally reported for debug logging code in

gdevcups.c in the CUPS output driver (CVE-2009-4270).

 

Buffer overflow in gs/psi/iscan.c in Ghostscript 8.64 and earlier

allows remote attackers to execute arbitrary code or cause a denial

of service (memory corruption) via a crafted PDF document containing

a long name (CVE-2009-4897).

 

Ghostscript 8.64, 8.70, and possibly other versions allows

context-dependent attackers to execute arbitrary code via a

PostScript file containing unlimited recursive procedure invocations,

which trigger memory corruption in the stack of the interpreter

(CVE-2010-1628).

 

As a precaution ghostscript has been rebuilt to link against the

system libpng library which was fixed with MDVSA-2010:133

 

Packages for 2008.0 and 2009.0 are provided as of the Extended

Maintenance Program. Please visit this link to learn more:

http://store.mandriva.com/product_info.php?cPath=149&products_id=490

 

The updated packages have been patched to correct these issues.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...