Lucene search

K
gentooGentoo FoundationGLSA-201412-17
HistoryDec 13, 2014 - 12:00 a.m.

GPL Ghostscript: Multiple vulnerabilities

2014-12-1300:00:00
Gentoo Foundation
security.gentoo.org
29
ghostscript
interpreter
pdf
vulnerabilities
postscript
cve
execution
arbitrary code
denial of service
upgrade

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.781

Percentile

98.3%

Background

Ghostscript is an interpreter for the PostScript language and for PDF.

Description

Multiple vulnerabilities have been discovered in GPL Ghostscript. Please review the CVE identifiers referenced below for details.

Impact

A context-dependent attacker could entice a user to open a specially crafted PostScript file or PDF using GPL Ghostscript, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All GPL Ghostscript users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=app-text/ghostscript-gpl-9.10-r2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-text/ghostscript-gpl<Β 9.10-r2UNKNOWN

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.781

Percentile

98.3%