Lucene search

K
freebsdFreeBSDCA8E56D5-E856-11DC-B5AF-0017319806E7
HistoryFeb 28, 2008 - 12:00 a.m.

ghostscript -- zseticcspace() function buffer overflow vulnerability

2008-02-2800:00:00
vuxml.freebsd.org
14

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.148 Low

EPSS

Percentile

95.8%

Chris Evans from the Google Security Team reports:

Severity: parsing of evil PostScript file will result in
arbitrary code execution.
A stack-based buffer overflow in the zseticcspace() function
in zicc.c allows remote arbitrary code execution via a
malicious PostScript file (.ps) that contains a long Range
array.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchghostscript-gpl< 8.61_2UNKNOWN
FreeBSDanynoarchghostscript-gpl-nox11< 8.61_2UNKNOWN

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.148 Low

EPSS

Percentile

95.8%