ID CVE-2017-9726 Type cve Reporter NVD Modified 2018-11-25T06:29:02
Description
The Ins_MDRP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
{"nessus": [{"lastseen": "2019-02-21T01:32:11", "bulletinFamily": "scanner", "description": "Several issues were found in Ghostscript, the GPL PostScript/PDF interpreter, which allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version 9.05~dfsg-6.3+deb7u7.\n\nWe recommend that you upgrade your ghostscript packages.\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "modified": "2018-07-09T00:00:00", "id": "DEBIAN_DLA-1048.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=102096", "published": "2017-08-02T00:00:00", "title": "Debian DLA-1048-1 : ghostscript security update", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-1048-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(102096);\n script_version(\"3.6\");\n script_cvs_date(\"Date: 2018/07/09 12:26:57\");\n\n script_cve_id(\"CVE-2017-11714\", \"CVE-2017-7207\", \"CVE-2017-9611\", \"CVE-2017-9612\", \"CVE-2017-9726\", \"CVE-2017-9727\", \"CVE-2017-9739\", \"CVE-2017-9835\");\n\n script_name(english:\"Debian DLA-1048-1 : ghostscript security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several issues were found in Ghostscript, the GPL PostScript/PDF\ninterpreter, which allow remote attackers to cause a denial of service\n(heap-based buffer overflow and application crash) or possibly have\nunspecified other impact via a crafted PostScript document.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n9.05~dfsg-6.3+deb7u7.\n\nWe recommend that you upgrade your ghostscript packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2017/08/msg00000.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/ghostscript\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ghostscript\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ghostscript-cups\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ghostscript-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ghostscript-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ghostscript-x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libgs-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libgs9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libgs9-common\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/08/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/08/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"ghostscript\", reference:\"9.05~dfsg-6.3+deb7u7\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"ghostscript-cups\", reference:\"9.05~dfsg-6.3+deb7u7\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"ghostscript-dbg\", reference:\"9.05~dfsg-6.3+deb7u7\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"ghostscript-doc\", reference:\"9.05~dfsg-6.3+deb7u7\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"ghostscript-x\", reference:\"9.05~dfsg-6.3+deb7u7\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libgs-dev\", reference:\"9.05~dfsg-6.3+deb7u7\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libgs9\", reference:\"9.05~dfsg-6.3+deb7u7\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libgs9-common\", reference:\"9.05~dfsg-6.3+deb7u7\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:36:36", "bulletinFamily": "scanner", "description": "This update for ghostscript fixes several issues. These security issues were fixed :\n\n - CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document (bsc#1050879).\n\n - CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get function in jbig2_huffman.c which allowed for DoS (bsc#1040643).\n\n - CVE-2016-10317: The fill_threshhold_buffer function in base/gxht_thresh.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document (bsc#1032230).\n\n - CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050891).\n\n - CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050889).\n\n - CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050888).\n\n - CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050887).\n\n - CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state structure, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document, related to an out-of-bounds read in the igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184).\n\n - CVE-2016-10219: The intersect function in base/gxfill.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file (bsc#1032138).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "modified": "2018-12-01T00:00:00", "id": "SUSE_SU-2018-0407-1.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=106745", "published": "2018-02-12T00:00:00", "title": "SUSE SLED12 / SLES12 Security Update : ghostscript (SUSE-SU-2018:0407-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2018:0407-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(106745);\n script_version(\"3.4\");\n script_cvs_date(\"Date: 2018/12/01 13:19:04\");\n\n script_cve_id(\"CVE-2016-10219\", \"CVE-2016-10317\", \"CVE-2017-11714\", \"CVE-2017-9216\", \"CVE-2017-9612\", \"CVE-2017-9726\", \"CVE-2017-9727\", \"CVE-2017-9739\", \"CVE-2017-9835\");\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : ghostscript (SUSE-SU-2018:0407-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for ghostscript fixes several issues. These security\nissues were fixed :\n\n - CVE-2017-9835: The gs_alloc_ref_array function allowed\n remote attackers to cause a denial of service\n (heap-based buffer overflow and application crash) or\n possibly have unspecified other impact via a crafted\n PostScript document (bsc#1050879).\n\n - CVE-2017-9216: Prevent NULL pointer dereference in the\n jbig2_huffman_get function in jbig2_huffman.c which\n allowed for DoS (bsc#1040643).\n\n - CVE-2016-10317: The fill_threshhold_buffer function in\n base/gxht_thresh.c allowed remote attackers to cause a\n denial of service (heap-based buffer overflow and\n application crash) or possibly have unspecified other\n impact via a crafted PostScript document (bsc#1032230).\n\n - CVE-2017-9612: The Ins_IP function in base/ttinterp.c\n allowed remote attackers to cause a denial of service\n (use-after-free and application crash) or possibly have\n unspecified other impact via a crafted document\n (bsc#1050891).\n\n - CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c\n allowed remote attackers to cause a denial of service\n (heap-based buffer over-read and application crash) or\n possibly have unspecified other impact via a crafted\n document (bsc#1050889).\n\n - CVE-2017-9727: The gx_ttfReader__Read function in\n base/gxttfb.c allowed remote attackers to cause a denial\n of service (heap-based buffer over-read and application\n crash) or possibly have unspecified other impact via a\n crafted document (bsc#1050888).\n\n - CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c\n allowed remote attackers to cause a denial of service\n (heap-based buffer over-read and application crash) or\n possibly have unspecified other impact via a crafted\n document (bsc#1050887).\n\n - CVE-2017-11714: psi/ztoken.c mishandled references to\n the scanner state structure, which allowed remote\n attackers to cause a denial of service (application\n crash) or possibly have unspecified other impact via a\n crafted PostScript document, related to an out-of-bounds\n read in the igc_reloc_struct_ptr function in psi/igc.c\n (bsc#1051184).\n\n - CVE-2016-10219: The intersect function in base/gxfill.c\n allowed remote attackers to cause a denial of service\n (divide-by-zero error and application crash) via a\n crafted file (bsc#1032138).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1032138\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1032230\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1040643\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1050879\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1050887\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1050888\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1050889\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1050891\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051184\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-10219/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-10317/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-11714/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9216/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9612/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9726/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9727/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9739/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9835/\"\n );\n # https://www.suse.com/support/update/announcement/2018/suse-su-20180407-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7690d5ba\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 12-SP3:zypper in -t\npatch SUSE-SLE-SDK-12-SP3-2018-277=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP2:zypper in -t\npatch SUSE-SLE-SDK-12-SP2-2018-277=1\n\nSUSE Linux Enterprise Server for Raspberry Pi 12-SP2:zypper in -t\npatch SUSE-SLE-RPI-12-SP2-2018-277=1\n\nSUSE Linux Enterprise Server 12-SP3:zypper in -t patch\nSUSE-SLE-SERVER-12-SP3-2018-277=1\n\nSUSE Linux Enterprise Server 12-SP2:zypper in -t patch\nSUSE-SLE-SERVER-12-SP2-2018-277=1\n\nSUSE Linux Enterprise Desktop 12-SP3:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP3-2018-277=1\n\nSUSE Linux Enterprise Desktop 12-SP2:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP2-2018-277=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ghostscript\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ghostscript-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ghostscript-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ghostscript-x11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ghostscript-x11-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/02/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/02/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = eregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! ereg(pattern:\"^(2|3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP2/3\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! ereg(pattern:\"^(2|3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP2/3\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"ghostscript-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"ghostscript-debuginfo-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"ghostscript-debugsource-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"ghostscript-x11-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"ghostscript-x11-debuginfo-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"ghostscript-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"ghostscript-debuginfo-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"ghostscript-debugsource-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"ghostscript-x11-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"ghostscript-x11-debuginfo-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"ghostscript-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"ghostscript-debuginfo-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"ghostscript-debugsource-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"ghostscript-x11-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"ghostscript-x11-debuginfo-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"ghostscript-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"ghostscript-debuginfo-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"ghostscript-debugsource-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"ghostscript-x11-9.15-23.7.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"2\", cpu:\"x86_64\", reference:\"ghostscript-x11-debuginfo-9.15-23.7.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ghostscript\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:36:36", "bulletinFamily": "scanner", "description": "This update for ghostscript fixes several security issues :\n\n - CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document (bsc#1050879).\n\n - CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get function in jbig2_huffman.c which allowed for DoS (bsc#1040643).\n\n - CVE-2016-10317: The fill_threshhold_buffer function in base/gxht_thresh.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document (bsc#1032230).\n\n - CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050891).\n\n - CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050889).\n\n - CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050888).\n\n - CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050887).\n\n - CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state structure, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document, related to an out-of-bounds read in the igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184).\n\n - CVE-2016-10219: The intersect function in base/gxfill.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file (bsc#1032138).\n\nThis update was imported from the SUSE:SLE-12:Update update project.", "modified": "2018-02-12T00:00:00", "id": "OPENSUSE-2018-157.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=106744", "published": "2018-02-12T00:00:00", "title": "openSUSE Security Update : ghostscript (openSUSE-2018-157)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2018-157.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(106744);\n script_version(\"$Revision: 3.1 $\");\n script_cvs_date(\"$Date: 2018/02/12 15:59:48 $\");\n\n script_cve_id(\"CVE-2016-10219\", \"CVE-2016-10317\", \"CVE-2017-11714\", \"CVE-2017-9216\", \"CVE-2017-9612\", \"CVE-2017-9726\", \"CVE-2017-9727\", \"CVE-2017-9739\", \"CVE-2017-9835\");\n\n script_name(english:\"openSUSE Security Update : ghostscript (openSUSE-2018-157)\");\n script_summary(english:\"Check for the openSUSE-2018-157 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for ghostscript fixes several security issues :\n\n - CVE-2017-9835: The gs_alloc_ref_array function allowed\n remote attackers to cause a denial of service\n (heap-based buffer overflow and application crash) or\n possibly have unspecified other impact via a crafted\n PostScript document (bsc#1050879).\n\n - CVE-2017-9216: Prevent NULL pointer dereference in the\n jbig2_huffman_get function in jbig2_huffman.c which\n allowed for DoS (bsc#1040643).\n\n - CVE-2016-10317: The fill_threshhold_buffer function in\n base/gxht_thresh.c allowed remote attackers to cause a\n denial of service (heap-based buffer overflow and\n application crash) or possibly have unspecified other\n impact via a crafted PostScript document (bsc#1032230).\n\n - CVE-2017-9612: The Ins_IP function in base/ttinterp.c\n allowed remote attackers to cause a denial of service\n (use-after-free and application crash) or possibly have\n unspecified other impact via a crafted document\n (bsc#1050891).\n\n - CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c\n allowed remote attackers to cause a denial of service\n (heap-based buffer over-read and application crash) or\n possibly have unspecified other impact via a crafted\n document (bsc#1050889).\n\n - CVE-2017-9727: The gx_ttfReader__Read function in\n base/gxttfb.c allowed remote attackers to cause a denial\n of service (heap-based buffer over-read and application\n crash) or possibly have unspecified other impact via a\n crafted document (bsc#1050888).\n\n - CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c\n allowed remote attackers to cause a denial of service\n (heap-based buffer over-read and application crash) or\n possibly have unspecified other impact via a crafted\n document (bsc#1050887).\n\n - CVE-2017-11714: psi/ztoken.c mishandled references to\n the scanner state structure, which allowed remote\n attackers to cause a denial of service (application\n crash) or possibly have unspecified other impact via a\n crafted PostScript document, related to an out-of-bounds\n read in the igc_reloc_struct_ptr function in psi/igc.c\n (bsc#1051184).\n\n - CVE-2016-10219: The intersect function in base/gxfill.c\n allowed remote attackers to cause a denial of service\n (divide-by-zero error and application crash) via a\n crafted file (bsc#1032138).\n\nThis update was imported from the SUSE:SLE-12:Update update project.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1032138\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1032230\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1040643\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1050879\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1050887\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1050888\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1050889\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1050891\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1051184\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected ghostscript packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ghostscript\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ghostscript-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ghostscript-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ghostscript-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ghostscript-mini\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ghostscript-mini-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ghostscript-mini-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ghostscript-mini-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ghostscript-x11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ghostscript-x11-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/02/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/02/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.3\", reference:\"ghostscript-9.15-14.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"ghostscript-debuginfo-9.15-14.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"ghostscript-debugsource-9.15-14.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"ghostscript-devel-9.15-14.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"ghostscript-mini-9.15-14.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"ghostscript-mini-debuginfo-9.15-14.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"ghostscript-mini-debugsource-9.15-14.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"ghostscript-mini-devel-9.15-14.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"ghostscript-x11-9.15-14.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"ghostscript-x11-debuginfo-9.15-14.3.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ghostscript-mini / ghostscript-mini-debuginfo / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:32:39", "bulletinFamily": "scanner", "description": "Kamil Frankowicz discovered that Ghostscript mishandles references. A remote attacker could use this to cause a denial of service.\n(CVE-2017-11714)\n\nKim Gwan Yeong discovered that Ghostscript could allow a heap-based buffer over-read and application crash. A remote attacker could use a crafted document to cause a denial of service. (CVE-2017-9611, CVE-2017-9726, CVE-2017-9727, CVE-2017-9739)\n\nKim Gwan Yeong discovered an use-after-free vulnerability in Ghostscript. A remote attacker could use a crafted file to cause a denial of service. (CVE-2017-9612)\n\nKim Gwan Yeong discovered a lack of integer overflow check in Ghostscript. A remote attacker could use crafted PostScript document to cause a denial of service. (CVE-2017-9835).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "modified": "2018-12-01T00:00:00", "id": "UBUNTU_USN-3403-1.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=102815", "published": "2017-08-29T00:00:00", "title": "Ubuntu 14.04 LTS / 16.04 LTS / 17.04 : ghostscript vulnerabilities (USN-3403-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3403-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(102815);\n script_version(\"3.6\");\n script_cvs_date(\"Date: 2018/12/01 15:12:41\");\n\n script_cve_id(\"CVE-2017-11714\", \"CVE-2017-9611\", \"CVE-2017-9612\", \"CVE-2017-9726\", \"CVE-2017-9727\", \"CVE-2017-9739\", \"CVE-2017-9835\");\n script_xref(name:\"USN\", value:\"3403-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 16.04 LTS / 17.04 : ghostscript vulnerabilities (USN-3403-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Kamil Frankowicz discovered that Ghostscript mishandles references. A\nremote attacker could use this to cause a denial of service.\n(CVE-2017-11714)\n\nKim Gwan Yeong discovered that Ghostscript could allow a heap-based\nbuffer over-read and application crash. A remote attacker could use a\ncrafted document to cause a denial of service. (CVE-2017-9611,\nCVE-2017-9726, CVE-2017-9727, CVE-2017-9739)\n\nKim Gwan Yeong discovered an use-after-free vulnerability in\nGhostscript. A remote attacker could use a crafted file to cause a\ndenial of service. (CVE-2017-9612)\n\nKim Gwan Yeong discovered a lack of integer overflow check in\nGhostscript. A remote attacker could use crafted PostScript document\nto cause a denial of service. (CVE-2017-9835).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/3403-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:ghostscript\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:ghostscript-x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libgs9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libgs9-common\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:17.04\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/08/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/08/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2017-2018 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(14\\.04|16\\.04|17\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 16.04 / 17.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"ghostscript\", pkgver:\"9.10~dfsg-0ubuntu10.10\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"ghostscript-x\", pkgver:\"9.10~dfsg-0ubuntu10.10\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"libgs9\", pkgver:\"9.10~dfsg-0ubuntu10.10\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"libgs9-common\", pkgver:\"9.10~dfsg-0ubuntu10.10\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"ghostscript\", pkgver:\"9.18~dfsg~0-0ubuntu2.7\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"ghostscript-x\", pkgver:\"9.18~dfsg~0-0ubuntu2.7\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"libgs9\", pkgver:\"9.18~dfsg~0-0ubuntu2.7\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"libgs9-common\", pkgver:\"9.18~dfsg~0-0ubuntu2.7\")) flag++;\nif (ubuntu_check(osver:\"17.04\", pkgname:\"ghostscript\", pkgver:\"9.19~dfsg+1-0ubuntu7.6\")) flag++;\nif (ubuntu_check(osver:\"17.04\", pkgname:\"ghostscript-x\", pkgver:\"9.19~dfsg+1-0ubuntu7.6\")) flag++;\nif (ubuntu_check(osver:\"17.04\", pkgname:\"libgs9\", pkgver:\"9.19~dfsg+1-0ubuntu7.6\")) flag++;\nif (ubuntu_check(osver:\"17.04\", pkgname:\"libgs9-common\", pkgver:\"9.19~dfsg+1-0ubuntu7.6\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ghostscript / ghostscript-x / libgs9 / libgs9-common\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:33:11", "bulletinFamily": "scanner", "description": "Several vulnerabilities were discovered in Ghostscript, the GPL PostScript/PDF interpreter, which may result in denial of service if a specially crafted Postscript file is processed.", "modified": "2018-11-10T00:00:00", "id": "DEBIAN_DSA-3986.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=103578", "published": "2017-10-02T00:00:00", "title": "Debian DSA-3986-1 : ghostscript - security update", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3986. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(103578);\n script_version(\"3.3\");\n script_cvs_date(\"Date: 2018/11/10 11:49:38\");\n\n script_cve_id(\"CVE-2017-11714\", \"CVE-2017-9611\", \"CVE-2017-9612\", \"CVE-2017-9726\", \"CVE-2017-9727\", \"CVE-2017-9739\", \"CVE-2017-9835\");\n script_xref(name:\"DSA\", value:\"3986\");\n\n script_name(english:\"Debian DSA-3986-1 : ghostscript - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities were discovered in Ghostscript, the GPL\nPostScript/PDF interpreter, which may result in denial of service if a\nspecially crafted Postscript file is processed.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869907\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869910\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869913\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869915\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869916\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869917\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869977\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/ghostscript\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/ghostscript\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2017/dsa-3986\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the ghostscript packages.\n\nFor the oldstable distribution (jessie), these problems have been\nfixed in version 9.06~dfsg-2+deb8u6.\n\nFor the stable distribution (stretch), these problems have been fixed\nin version 9.20~dfsg-3.2+deb9u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ghostscript\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/09/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/10/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"ghostscript\", reference:\"9.06~dfsg-2+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"ghostscript-dbg\", reference:\"9.06~dfsg-2+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"ghostscript-doc\", reference:\"9.06~dfsg-2+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"ghostscript-x\", reference:\"9.06~dfsg-2+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libgs-dev\", reference:\"9.06~dfsg-2+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libgs9\", reference:\"9.06~dfsg-2+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libgs9-common\", reference:\"9.06~dfsg-2+deb8u6\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"ghostscript\", reference:\"9.20~dfsg-3.2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"ghostscript-dbg\", reference:\"9.20~dfsg-3.2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"ghostscript-doc\", reference:\"9.20~dfsg-3.2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"ghostscript-x\", reference:\"9.20~dfsg-3.2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libgs-dev\", reference:\"9.20~dfsg-3.2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libgs9\", reference:\"9.20~dfsg-3.2+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libgs9-common\", reference:\"9.20~dfsg-3.2+deb9u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:39:09", "bulletinFamily": "scanner", "description": "This update for ghostscript-library fixes several issues. These security issues were fixed :\n\n - CVE-2017-7207: The mem_get_bits_rectangle function allowed remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document (bsc#1030263).\n\n - CVE-2016-9601: Prevent heap-buffer overflow by checking for an integer overflow in jbig2_image_new function (bsc#1018128).\n\n - CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050891)\n\n - CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050889)\n\n - CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050888)\n\n - CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050887)\n\n - CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state structure, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document, related to an out-of-bounds read in the igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184)\n\n - CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document (bsc#1050879)\n\n - CVE-2016-10219: The intersect function in base/gxfill.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file (bsc#1032138)\n\n - CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get function in jbig2_huffman.c which allowed for DoS (bsc#1040643)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "modified": "2018-12-01T00:00:00", "id": "SUSE_SU-2018-1140-1.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=109572", "published": "2018-05-04T00:00:00", "title": "SUSE SLES11 Security Update : ghostscript-library (SUSE-SU-2018:1140-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2018:1140-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109572);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2018/12/01 13:19:05\");\n\n script_cve_id(\"CVE-2016-10219\", \"CVE-2016-9601\", \"CVE-2017-11714\", \"CVE-2017-7207\", \"CVE-2017-9216\", \"CVE-2017-9612\", \"CVE-2017-9726\", \"CVE-2017-9727\", \"CVE-2017-9739\", \"CVE-2017-9835\");\n\n script_name(english:\"SUSE SLES11 Security Update : ghostscript-library (SUSE-SU-2018:1140-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for ghostscript-library fixes several issues. These\nsecurity issues were fixed :\n\n - CVE-2017-7207: The mem_get_bits_rectangle function\n allowed remote attackers to cause a denial of service\n (NULL pointer dereference) via a crafted PostScript\n document (bsc#1030263).\n\n - CVE-2016-9601: Prevent heap-buffer overflow by checking\n for an integer overflow in jbig2_image_new function\n (bsc#1018128).\n\n - CVE-2017-9612: The Ins_IP function in base/ttinterp.c\n allowed remote attackers to cause a denial of service\n (use-after-free and application crash) or possibly have\n unspecified other impact via a crafted document\n (bsc#1050891)\n\n - CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c\n allowed remote attackers to cause a denial of service\n (heap-based buffer over-read and application crash) or\n possibly have unspecified other impact via a crafted\n document (bsc#1050889)\n\n - CVE-2017-9727: The gx_ttfReader__Read function in\n base/gxttfb.c allowed remote attackers to cause a denial\n of service (heap-based buffer over-read and application\n crash) or possibly have unspecified other impact via a\n crafted document (bsc#1050888)\n\n - CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c\n allowed remote attackers to cause a denial of service\n (heap-based buffer over-read and application crash) or\n possibly have unspecified other impact via a crafted\n document (bsc#1050887)\n\n - CVE-2017-11714: psi/ztoken.c mishandled references to\n the scanner state structure, which allowed remote\n attackers to cause a denial of service (application\n crash) or possibly have unspecified other impact via a\n crafted PostScript document, related to an out-of-bounds\n read in the igc_reloc_struct_ptr function in psi/igc.c\n (bsc#1051184)\n\n - CVE-2017-9835: The gs_alloc_ref_array function allowed\n remote attackers to cause a denial of service\n (heap-based buffer overflow and application crash) or\n possibly have unspecified other impact via a crafted\n PostScript document (bsc#1050879)\n\n - CVE-2016-10219: The intersect function in base/gxfill.c\n allowed remote attackers to cause a denial of service\n (divide-by-zero error and application crash) via a\n crafted file (bsc#1032138)\n\n - CVE-2017-9216: Prevent NULL pointer dereference in the\n jbig2_huffman_get function in jbig2_huffman.c which\n allowed for DoS (bsc#1040643)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1018128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1030263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1032138\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1032230\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1040643\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1050879\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1050887\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1050888\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1050889\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1050891\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051184\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-10219/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9601/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-11714/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-7207/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9216/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9612/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9726/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9727/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9739/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-9835/\"\n );\n # https://www.suse.com/support/update/announcement/2018/suse-su-20181140-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?15ef2aca\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 11-SP4:zypper in -t\npatch sdksp4-ghostscript-library-13588=1\n\nSUSE Linux Enterprise Server 11-SP4:zypper in -t patch\nslessp4-ghostscript-library-13588=1\n\nSUSE Linux Enterprise Debuginfo 11-SP4:zypper in -t patch\ndbgsp4-ghostscript-library-13588=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ghostscript-fonts-other\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ghostscript-fonts-rus\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ghostscript-fonts-std\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ghostscript-library\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ghostscript-omni\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ghostscript-x11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgimpprint\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = eregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! ereg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"ghostscript-fonts-other-8.62-32.47.7.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"ghostscript-fonts-rus-8.62-32.47.7.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"ghostscript-fonts-std-8.62-32.47.7.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"ghostscript-library-8.62-32.47.7.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"ghostscript-omni-8.62-32.47.7.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"ghostscript-x11-8.62-32.47.7.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"libgimpprint-4.2.7-32.47.7.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ghostscript-library\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:44:10", "bulletinFamily": "scanner", "description": "The remote host is affected by the vulnerability described in GLSA-201811-12 (GPL Ghostscript: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in GPL Ghostscript. Please review the CVE identifiers referenced below for additional information.\n Impact :\n\n A context-dependent attacker could entice a user to open a specially crafted PostScript file or PDF document using GPL Ghostscript possibly resulting in the execution of arbitrary code with the privileges of the process, a Denial of Service condition, or other unspecified impacts, Workaround :\n\n There is no known workaround at this time.", "modified": "2018-12-07T00:00:00", "id": "GENTOO_GLSA-201811-12.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=119132", "published": "2018-11-26T00:00:00", "title": "GLSA-201811-12 : GPL Ghostscript: Multiple vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201811-12.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119132);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2018/12/07 9:46:53\");\n\n script_cve_id(\"CVE-2017-11714\", \"CVE-2017-7948\", \"CVE-2017-9610\", \"CVE-2017-9611\", \"CVE-2017-9612\", \"CVE-2017-9618\", \"CVE-2017-9619\", \"CVE-2017-9620\", \"CVE-2017-9726\", \"CVE-2017-9727\", \"CVE-2017-9739\", \"CVE-2017-9740\", \"CVE-2017-9835\", \"CVE-2018-10194\", \"CVE-2018-15908\", \"CVE-2018-15909\", \"CVE-2018-15910\", \"CVE-2018-15911\", \"CVE-2018-16509\", \"CVE-2018-16510\", \"CVE-2018-16511\", \"CVE-2018-16513\", \"CVE-2018-16539\", \"CVE-2018-16540\", \"CVE-2018-16541\", \"CVE-2018-16542\", \"CVE-2018-16543\", \"CVE-2018-16585\", \"CVE-2018-16802\", \"CVE-2018-18284\", \"CVE-2018-19409\");\n script_xref(name:\"GLSA\", value:\"201811-12\");\n\n script_name(english:\"GLSA-201811-12 : GPL Ghostscript: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201811-12\n(GPL Ghostscript: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in GPL Ghostscript. Please\n review the CVE identifiers referenced below for additional information.\n \nImpact :\n\n A context-dependent attacker could entice a user to open a specially\n crafted PostScript file or PDF document using GPL Ghostscript possibly\n resulting in the execution of arbitrary code with the privileges of the\n process, a Denial of Service condition, or other unspecified impacts,\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201811-12\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All GPL Ghostscript users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-text/ghostscript-gpl-9.26'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Ghostscript Failed Restore Command Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:ghostscript-gpl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/11/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/11/26\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"app-text/ghostscript-gpl\", unaffected:make_list(\"ge 9.26\"), vulnerable:make_list(\"lt 9.26\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"GPL Ghostscript\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2018-08-31T00:09:26", "bulletinFamily": "unix", "description": "Kamil Frankowicz discovered that Ghostscript mishandles references. A remote attacker could use this to cause a denial of service. (CVE-2017-11714)\n\nKim Gwan Yeong discovered that Ghostscript could allow a heap-based buffer over-read and application crash. A remote attacker could use a crafted document to cause a denial of service. (CVE-2017-9611, CVE-2017-9726, CVE-2017-9727, CVE-2017-9739)\n\nKim Gwan Yeong discovered an use-after-free vulnerability in Ghostscript. A remote attacker could use a crafted file to cause a denial of service. (CVE-2017-9612)\n\nKim Gwan Yeong discovered a lack of integer overflow check in Ghostscript. A remote attacker could use crafted PostScript document to cause a denial of service. (CVE-2017-9835)", "modified": "2017-08-28T00:00:00", "published": "2017-08-28T00:00:00", "id": "USN-3403-1", "href": "https://usn.ubuntu.com/3403-1/", "title": "Ghostscript vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "debian": [{"lastseen": "2018-10-16T22:12:45", "bulletinFamily": "unix", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3986-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nSeptember 29, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : ghostscript\nCVE ID : CVE-2017-9611 CVE-2017-9612 CVE-2017-9726 CVE-2017-9727\n CVE-2017-9739 CVE-2017-9835 CVE-2017-11714\nDebian Bug : 869907 869910 869913 869915 869916 869917 869977\n\nSeveral vulnerabilities were discovered in Ghostscript, the GPL\nPostScript/PDF interpreter, which may result in denial of service if a\nspecially crafted Postscript file is processed.\n\nFor the oldstable distribution (jessie), these problems have been fixed\nin version 9.06~dfsg-2+deb8u6.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 9.20~dfsg-3.2+deb9u1.\n\nWe recommend that you upgrade your ghostscript packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "modified": "2017-09-29T20:59:14", "published": "2017-09-29T20:59:14", "id": "DEBIAN:DSA-3986-1:CA908", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2017/msg00248.html", "title": "[SECURITY] [DSA 3986-1] ghostscript security update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-10-18T13:49:08", "bulletinFamily": "unix", "description": "Package : ghostscript\nVersion : 9.05~dfsg-6.3+deb7u7\nCVE ID : CVE-2017-7207 CVE-2017-9611 CVE-2017-9612\n CVE-2017-9726 CVE-2017-9727 CVE-2017-9739\n CVE-2017-9835 CVE-2017-11714\nDebian Bug : 858350 869977 869907 869910 869913 869915 869916 869917\n\nSeveral issues were found in Ghostscript, the GPL PostScript/PDF\ninterpreter, which allow remote attackers to cause a denial of service\n(heap-based buffer overflow and application crash) or possibly have\nunspecified other impact via a crafted PostScript document.\n\nFor Debian 7 "Wheezy", these problems have been fixed in version\n9.05~dfsg-6.3+deb7u7.\n\nWe recommend that you upgrade your ghostscript packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "modified": "2017-08-01T12:41:58", "published": "2017-08-01T12:41:58", "id": "DEBIAN:DLA-1048-1:185D4", "href": "https://lists.debian.org/debian-lts-announce/2017/debian-lts-announce-201708/msg00000.html", "title": "[SECURITY] [DLA 1048-1] ghostscript security update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "openvas": [{"lastseen": "2018-09-01T23:39:50", "bulletinFamily": "scanner", "description": "Several issues were found in Ghostscript, the GPL PostScript/PDF\ninterpreter, which allow remote attackers to cause a denial of service\n(heap-based buffer overflow and application crash) or possibly have\nunspecified other impact via a crafted PostScript document.", "modified": "2018-07-10T00:00:00", "published": "2018-02-07T00:00:00", "id": "OPENVAS:1361412562310891048", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310891048", "title": "Debian LTS Advisory ([SECURITY] [DLA 1048-1] ghostscript security update)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: deb_dla_1048.nasl 10474 2018-07-10 08:12:26Z cfischer $\n#\n# Auto-generated from advisory DLA 1048-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.891048\");\n script_version(\"$Revision: 10474 $\");\n script_cve_id(\"CVE-2017-11714\", \"CVE-2017-7207\", \"CVE-2017-9611\", \"CVE-2017-9612\", \"CVE-2017-9726\", \"CVE-2017-9727\", \"CVE-2017-9739\", \"CVE-2017-9835\");\n script_name(\"Debian LTS Advisory ([SECURITY] [DLA 1048-1] ghostscript security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-07-10 10:12:26 +0200 (Tue, 10 Jul 2018) $\");\n script_tag(name:\"creation_date\", value:\"2018-02-07 00:00:00 +0100 (Wed, 07 Feb 2018)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2017/08/msg00000.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB7\\.[0-9]+\");\n script_tag(name:\"affected\", value:\"ghostscript on Debian Linux\");\n script_tag(name:\"insight\", value:\"GPL Ghostscript is used for PostScript/PDF preview and printing.\nUsually as a back-end to a program such as ghostview, it can display\nPostScript and PDF documents in an X11 environment.\");\n script_tag(name:\"solution\", value:\"For Debian 7 'Wheezy', these problems have been fixed in version\n9.05~dfsg-6.3+deb7u7.\n\nWe recommend that you upgrade your ghostscript packages.\");\n script_tag(name:\"summary\", value:\"Several issues were found in Ghostscript, the GPL PostScript/PDF\ninterpreter, which allow remote attackers to cause a denial of service\n(heap-based buffer overflow and application crash) or possibly have\nunspecified other impact via a crafted PostScript document.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"ghostscript\", ver:\"9.05~dfsg-6.3+deb7u7\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-cups\", ver:\"9.05~dfsg-6.3+deb7u7\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-dbg\", ver:\"9.05~dfsg-6.3+deb7u7\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-doc\", ver:\"9.05~dfsg-6.3+deb7u7\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-x\", ver:\"9.05~dfsg-6.3+deb7u7\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs-dev\", ver:\"9.05~dfsg-6.3+deb7u7\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs9\", ver:\"9.05~dfsg-6.3+deb7u7\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs9-common\", ver:\"9.05~dfsg-6.3+deb7u7\", rls_regex:\"DEB7\\.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-09-01T23:41:57", "bulletinFamily": "scanner", "description": "Several vulnerabilities were discovered in Ghostscript, the GPL\nPostScript/PDF interpreter, which may result in denial of service if a\nspecially crafted Postscript file is processed.", "modified": "2017-10-04T00:00:00", "published": "2017-09-29T00:00:00", "id": "OPENVAS:1361412562310703986", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703986", "title": "Debian Security Advisory DSA 3986-1 (ghostscript - security update)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: deb_3986.nasl 7336 2017-10-04 05:42:02Z asteins $\n#\n# Auto-generated from advisory DSA 3986-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703986\");\n script_version(\"$Revision: 7336 $\");\n script_cve_id(\"CVE-2017-11714\", \"CVE-2017-9611\", \"CVE-2017-9612\", \"CVE-2017-9726\", \"CVE-2017-9727\", \"CVE-2017-9739\", \"CVE-2017-9835\");\n script_name(\"Debian Security Advisory DSA 3986-1 (ghostscript - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-10-04 07:42:02 +0200 (Wed, 04 Oct 2017) $\");\n script_tag(name:\"creation_date\", value:\"2017-09-29 00:00:00 +0200 (Fri, 29 Sep 2017)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2017/dsa-3986.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name:\"affected\", value:\"ghostscript on Debian Linux\");\n script_tag(name:\"insight\", value:\"GPL Ghostscript is used for PostScript/PDF preview and printing.\nUsually as a back-end to a program such as ghostview, it can display\nPostScript and PDF documents in an X11 environment.\");\n script_tag(name:\"solution\", value:\"For the oldstable distribution (jessie), these problems have been fixed\nin version 9.06~dfsg-2+deb8u6.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 9.20~dfsg-3.2+deb9u1.\n\nWe recommend that you upgrade your ghostscript packages.\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities were discovered in Ghostscript, the GPL\nPostScript/PDF interpreter, which may result in denial of service if a\nspecially crafted Postscript file is processed.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"ghostscript\", ver:\"9.20~dfsg-3.2+deb9u1\", rls_regex:\"DEB9.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-dbg\", ver:\"9.20~dfsg-3.2+deb9u1\", rls_regex:\"DEB9.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-doc\", ver:\"9.20~dfsg-3.2+deb9u1\", rls_regex:\"DEB9.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-x\", ver:\"9.20~dfsg-3.2+deb9u1\", rls_regex:\"DEB9.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs-dev\", ver:\"9.20~dfsg-3.2+deb9u1\", rls_regex:\"DEB9.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs9\", ver:\"9.20~dfsg-3.2+deb9u1\", rls_regex:\"DEB9.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs9-common\", ver:\"9.20~dfsg-3.2+deb9u1\", rls_regex:\"DEB9.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript\", ver:\"9.06~dfsg-2+deb8u6\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-dbg\", ver:\"9.06~dfsg-2+deb8u6\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-doc\", ver:\"9.06~dfsg-2+deb8u6\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-x\", ver:\"9.06~dfsg-2+deb8u6\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs-dev\", ver:\"9.06~dfsg-2+deb8u6\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs9\", ver:\"9.06~dfsg-2+deb8u6\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs9-common\", ver:\"9.06~dfsg-2+deb8u6\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-10-29T12:33:48", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2018-10-26T00:00:00", "published": "2018-10-26T00:00:00", "id": "OPENVAS:1361412562310843765", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843765", "title": "Ubuntu Update for ghostscript USN-3403-1", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3403_1.nasl 12130 2018-10-26 13:59:17Z cfischer $\n#\n# Ubuntu Update for ghostscript USN-3403-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843765\");\n script_version(\"$Revision: 12130 $\");\n script_cve_id(\"CVE-2017-11714\", \"CVE-2017-9611\", \"CVE-2017-9726\", \"CVE-2017-9727\", \"CVE-2017-9739\", \"CVE-2017-9612\", \"CVE-2017-9835\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:59:17 +0200 (Fri, 26 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2018-10-26 06:16:09 +0200 (Fri, 26 Oct 2018)\");\n script_name(\"Ubuntu Update for ghostscript USN-3403-1\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|17\\.04|16\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"3403-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3403-1/\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'ghostscript'\n package(s) announced via the USN-3403-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Kamil Frankowicz discovered that Ghostscript mishandles references.\nA remote attacker could use this to cause a denial of service.\n(CVE-2017-11714)\n\nKim Gwan Yeong discovered that Ghostscript could allow a heap-based\nbuffer over-read and application crash. A remote attacker could use a\ncrafted document to cause a denial of service. (CVE-2017-9611,  \nCVE-2017-9726, CVE-2017-9727, CVE-2017-9739)\n\nKim Gwan Yeong discovered an use-after-free vulnerability in\nGhostscript. A remote attacker could use a crafted file to cause a\ndenial of service. (CVE-2017-9612)\n\nKim Gwan Yeong discovered a lack of integer overflow check in\nGhostscript. A remote attacker could use crafted PostScript document to\ncause a denial of service. (CVE-2017-9835)\");\n\n script_tag(name:\"affected\", value:\"ghostscript on Ubuntu 17.04,\n Ubuntu 16.04 LTS,\n Ubuntu 14.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"ghostscript\", ver:\"9.10~dfsg-0ubuntu10.10\", rls:\"UBUNTU14.04 LTS\", remove_arch:TRUE)) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ghostscript-x\", ver:\"9.10~dfsg-0ubuntu10.10\", rls:\"UBUNTU14.04 LTS\", remove_arch:TRUE)) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgs9\", ver:\"9.10~dfsg-0ubuntu10.10\", rls:\"UBUNTU14.04 LTS\", remove_arch:TRUE)) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgs9-common\", ver:\"9.10~dfsg-0ubuntu10.10\", rls:\"UBUNTU14.04 LTS\", remove_arch:TRUE)) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU17.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"ghostscript\", ver:\"9.19~dfsg+1-0ubuntu7.6\", rls:\"UBUNTU17.04\", remove_arch:TRUE)) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ghostscript-x\", ver:\"9.19~dfsg+1-0ubuntu7.6\", rls:\"UBUNTU17.04\", remove_arch:TRUE)) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgs9\", ver:\"9.19~dfsg+1-0ubuntu7.6\", rls:\"UBUNTU17.04\", remove_arch:TRUE)) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgs9-common\", ver:\"9.19~dfsg+1-0ubuntu7.6\", rls:\"UBUNTU17.04\", remove_arch:TRUE)) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"ghostscript\", ver:\"9.18~dfsg~0-0ubuntu2.7\", rls:\"UBUNTU16.04 LTS\", remove_arch:TRUE)) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ghostscript-x\", ver:\"9.18~dfsg~0-0ubuntu2.7\", rls:\"UBUNTU16.04 LTS\", remove_arch:TRUE)) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgs9\", ver:\"9.18~dfsg~0-0ubuntu2.7\", rls:\"UBUNTU16.04 LTS\", remove_arch:TRUE)) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgs9-common\", ver:\"9.18~dfsg~0-0ubuntu2.7\", rls:\"UBUNTU16.04 LTS\", remove_arch:TRUE)) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-09-01T23:44:44", "bulletinFamily": "scanner", "description": "Check the version of ghostscript", "modified": "2017-11-28T00:00:00", "published": "2017-11-23T00:00:00", "id": "OPENVAS:1361412562310873666", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310873666", "title": "Fedora Update for ghostscript FEDORA-2017-c9b0c406b3", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2017_c9b0c406b3_ghostscript_fc27.nasl 7920 2017-11-28 07:49:35Z asteins $\n#\n# Fedora Update for ghostscript FEDORA-2017-c9b0c406b3\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.873666\");\n script_version(\"$Revision: 7920 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-11-28 08:49:35 +0100 (Tue, 28 Nov 2017) $\");\n script_tag(name:\"creation_date\", value:\"2017-11-23 08:05:13 +0100 (Thu, 23 Nov 2017)\");\n script_cve_id(\"CVE-2017-11714\", \"CVE-2017-9610\", \"CVE-2017-9611\", \"CVE-2017-9612\", \n \"CVE-2017-9618\", \"CVE-2017-9619\", \"CVE-2017-9620\", \"CVE-2017-9726\", \n \"CVE-2017-9727\", \"CVE-2017-9739\", \"CVE-2017-9740\", \"CVE-2017-9835\", \n \"CVE-2017-9216\", \"CVE-2017-8908\", \"CVE-2017-7948\", \"CVE-2017-6196\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for ghostscript FEDORA-2017-c9b0c406b3\");\n script_tag(name: \"summary\", value: \"Check the version of ghostscript\");\n script_tag(name: \"vuldetect\", value: \"Get the installed version with the help \nof detect NVT and check if the version is vulnerable or not.\");\n script_tag(name: \"insight\", value: \"Ghostscript is a set of software that \nprovides a PostScript interpreter, a set of C procedures (the Ghostscript library, \nwhich implements the graphics capabilities in the PostScript language) and\nan interpreter for Portable Document Format (PDF) files. Ghostscript translates \nPostScript code into many common, bitmapped formats, like those understood by \nyour printer or screen. Ghostscript is normally used to display PostScript \nfiles and to print PostScript files to non-PostScript printers.\n\nIf you need to display PostScript files or print them to\nnon-PostScript printers, you should install ghostscript. If you\ninstall ghostscript, you also need to install the urw-base35-fonts\npackage.\n\");\n script_tag(name: \"affected\", value: \"ghostscript on Fedora 27\");\n script_tag(name: \"solution\", value: \"Please Install the Updated Packages.\");\n\n script_xref(name: \"FEDORA\", value: \"2017-c9b0c406b3\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2QUCMGMEGU4TK3I5424ZFZYFJHEQRF4P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"ghostscript\", rpm:\"ghostscript~9.22~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-09-01T23:44:48", "bulletinFamily": "scanner", "description": "Check the version of poppler-data", "modified": "2017-11-28T00:00:00", "published": "2017-11-23T00:00:00", "id": "OPENVAS:1361412562310873723", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310873723", "title": "Fedora Update for poppler-data FEDORA-2017-c9b0c406b3", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2017_c9b0c406b3_poppler-data_fc27.nasl 7920 2017-11-28 07:49:35Z asteins $\n#\n# Fedora Update for poppler-data FEDORA-2017-c9b0c406b3\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.873723\");\n script_version(\"$Revision: 7920 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-11-28 08:49:35 +0100 (Tue, 28 Nov 2017) $\");\n script_tag(name:\"creation_date\", value:\"2017-11-23 08:10:30 +0100 (Thu, 23 Nov 2017)\");\n script_cve_id(\"CVE-2017-11714\", \"CVE-2017-9610\", \"CVE-2017-9611\", \"CVE-2017-9612\", \n \"CVE-2017-9618\", \"CVE-2017-9619\", \"CVE-2017-9620\", \"CVE-2017-9726\", \n \"CVE-2017-9727\", \"CVE-2017-9739\", \"CVE-2017-9740\", \"CVE-2017-9835\", \n \"CVE-2017-9216\", \"CVE-2017-8908\", \"CVE-2017-7948\", \"CVE-2017-6196\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for poppler-data FEDORA-2017-c9b0c406b3\");\n script_tag(name: \"summary\", value: \"Check the version of poppler-data\");\n script_tag(name: \"vuldetect\", value: \"Get the installed version with the help \nof detect NVT and check if the version is vulnerable or not.\");\n script_tag(name: \"insight\", value: \"This package consists of encoding files \nfor poppler. When installed, the encoding files enables poppler to correctly \nrender CJK and Cyrillic properly.\");\n script_tag(name: \"affected\", value: \"poppler-data on Fedora 27\");\n script_tag(name: \"solution\", value: \"Please Install the Updated Packages.\");\n\n script_xref(name: \"FEDORA\", value: \"2017-c9b0c406b3\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D5KRP2OGBSPD7LH2V5OORJQ64U3AKONZ\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"poppler-data\", rpm:\"poppler-data~0.4.8~3.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "gentoo": [{"lastseen": "2018-11-25T00:34:57", "bulletinFamily": "unix", "description": "### Background\n\nGhostscript is an interpreter for the PostScript language and for PDF.\n\n### Description\n\nMultiple vulnerabilities have been discovered in GPL Ghostscript. Please review the CVE identifiers referenced below for additional information. \n\n### Impact\n\nA context-dependent attacker could entice a user to open a specially crafted PostScript file or PDF document using GPL Ghostscript possibly resulting in the execution of arbitrary code with the privileges of the process, a Denial of Service condition, or other unspecified impacts, \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll GPL Ghostscript users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-text/ghostscript-gpl-9.26\"", "modified": "2018-11-24T00:00:00", "published": "2018-11-24T00:00:00", "id": "GLSA-201811-12", "href": "https://security.gentoo.org/glsa/201811-12", "title": "GPL Ghostscript: Multiple vulnerabilities", "type": "gentoo", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}