Lucene search

K
gentooGentoo FoundationGLSA-201412-17
HistoryDec 13, 2014 - 12:00 a.m.

GPL Ghostscript: Multiple vulnerabilities

2014-12-1300:00:00
Gentoo Foundation
security.gentoo.org
19

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.77 High

EPSS

Percentile

98.2%

Background

Ghostscript is an interpreter for the PostScript language and for PDF.

Description

Multiple vulnerabilities have been discovered in GPL Ghostscript. Please review the CVE identifiers referenced below for details.

Impact

A context-dependent attacker could entice a user to open a specially crafted PostScript file or PDF using GPL Ghostscript, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All GPL Ghostscript users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=app-text/ghostscript-gpl-9.10-r2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-text/ghostscript-gpl<Β 9.10-r2UNKNOWN

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.77 High

EPSS

Percentile

98.2%