EulerOS Virtualization for ARM 64 3.0.2.0 is affected by multiple buffer overflow and denial of service vulnerabilities in Artifex Software GhostScript v9.50, fixed in v9.5
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | EulerOS 2.0 SP2 : ghostscript (EulerOS-SA-2020-2344) | 3 Nov 202000:00 | – | nessus |
![]() | EulerOS 2.0 SP3 : ghostscript (EulerOS-SA-2021-1067) | 20 Jan 202100:00 | – | nessus |
![]() | EulerOS 2.0 SP5 : ghostscript (EulerOS-SA-2020-2282) | 30 Oct 202000:00 | – | nessus |
![]() | Debian DSA-4748-1 : ghostscript - security update | 26 Aug 202000:00 | – | nessus |
![]() | Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS : Ghostscript vulnerabilities (USN-4469-1) | 25 Aug 202000:00 | – | nessus |
![]() | CentOS 8 : ghostscript (CESA-2021:1852) | 19 May 202100:00 | – | nessus |
![]() | GLSA-202008-20 : GPL Ghostscript: Multiple vulnerabilities | 31 Aug 202000:00 | – | nessus |
![]() | RHEL 8 : ghostscript (RHSA-2021:1852) | 19 May 202100:00 | – | nessus |
![]() | EulerOS 2.0 SP8 : ghostscript (EulerOS-SA-2020-2309) | 2 Nov 202000:00 | – | nessus |
![]() | Debian DLA-2335-1 : ghostscript security update | 21 Aug 202000:00 | – | nessus |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(144722);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/01/31");
script_cve_id(
"CVE-2020-16287",
"CVE-2020-16288",
"CVE-2020-16289",
"CVE-2020-16290",
"CVE-2020-16291",
"CVE-2020-16292",
"CVE-2020-16294",
"CVE-2020-16295",
"CVE-2020-16296",
"CVE-2020-16297",
"CVE-2020-16298",
"CVE-2020-16299",
"CVE-2020-16300",
"CVE-2020-16301",
"CVE-2020-16302",
"CVE-2020-16305",
"CVE-2020-16308",
"CVE-2020-16309",
"CVE-2020-16310",
"CVE-2020-17538"
);
script_name(english:"EulerOS Virtualization for ARM 64 3.0.2.0 : ghostscript (EulerOS-SA-2021-1041)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS Virtualization for ARM 64 host is missing multiple security
updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the ghostscript packages installed, the
EulerOS Virtualization for ARM 64 installation on the remote host is
affected by the following vulnerabilities :
- A buffer overflow vulnerability in lprn_is_black() in
contrib/lips4/gdevlprn.c of Artifex Software
GhostScript v9.50 allows a remote attacker to cause a
denial of service via a crafted PDF file. This is fixed
in v9.51.(CVE-2020-16287)
- A buffer overflow vulnerability in
pj_common_print_page() in devices/gdevpjet.c of Artifex
Software GhostScript v9.50 allows a remote attacker to
cause a denial of service via a crafted PDF file. This
is fixed in v9.51.(CVE-2020-16288)
- A buffer overflow vulnerability in cif_print_page() in
devices/gdevcif.c of Artifex Software GhostScript v9.50
allows a remote attacker to cause a denial of service
via a crafted PDF file. This is fixed in
v9.51.(CVE-2020-16289)
- A buffer overflow vulnerability in
jetp3852_print_page() in devices/gdev3852.c of Artifex
Software GhostScript v9.50 allows a remote attacker to
cause a denial of service via a crafted PDF file. This
is fixed in v9.51.(CVE-2020-16290)
- A buffer overflow vulnerability in contrib/gdevdj9.c of
Artifex Software GhostScript v9.50 allows a remote
attacker to cause a denial of service via a crafted PDF
file. This is fixed in v9.51.(CVE-2020-16291)
- A buffer overflow vulnerability in mj_raster_cmd() in
contrib/japanese/gdevmjc.c of Artifex Software
GhostScript v9.50 allows a remote attacker to cause a
denial of service via a crafted PDF file. This is fixed
in v9.51.(CVE-2020-16292)
- A buffer overflow vulnerability in epsc_print_page() in
devices/gdevepsc.c of Artifex Software GhostScript
v9.50 allows a remote attacker to cause a denial of
service via a crafted PDF file. This is fixed in
v9.51.(CVE-2020-16294)
- A null pointer dereference vulnerability in
clj_media_size() in devices/gdevclj.c of Artifex
Software GhostScript v9.50 allows a remote attacker to
cause a denial of service via a crafted PDF file. This
is fixed in v9.51.(CVE-2020-16295)
- A buffer overflow vulnerability in GetNumWrongData() in
contrib/lips4/gdevlips.c of Artifex Software
GhostScript v9.50 allows a remote attacker to cause a
denial of service via a crafted PDF file. This is fixed
in v9.51.(CVE-2020-16296)
- A buffer overflow vulnerability in
FloydSteinbergDitheringC() in contrib/gdevbjca.c of
Artifex Software GhostScript v9.50 allows a remote
attacker to cause a denial of service via a crafted PDF
file. This is fixed in v9.51.(CVE-2020-16297)
- A buffer overflow vulnerability in mj_color_correct()
in contrib/japanese/gdevmjc.c of Artifex Software
GhostScript v9.50 allows a remote attacker to cause a
denial of service via a crafted PDF file. This is fixed
in v9.51.(CVE-2020-16298)
- A Division by Zero vulnerability in bj10v_print_page()
in contrib/japanese/gdev10v.c of Artifex Software
GhostScript v9.50 allows a remote attacker to cause a
denial of service via a crafted PDF file. This is fixed
in v9.51.(CVE-2020-16299)
- A buffer overflow vulnerability in tiff12_print_page()
in devices/gdevtfnx.c of Artifex Software GhostScript
v9.50 allows a remote attacker to cause a denial of
service via a crafted PDF file. This is fixed in
v9.51.(CVE-2020-16300)
- A buffer overflow vulnerability in okiibm_print_page1()
in devices/gdevokii.c of Artifex Software GhostScript
v9.50 allows a remote attacker to cause a denial of
service via a crafted PDF file. This is fixed in
v9.51.(CVE-2020-16301)
- A buffer overflow vulnerability in
jetp3852_print_page() in devices/gdev3852.c of Artifex
Software GhostScript v9.50 allows a remote attacker to
escalate privileges via a crafted PDF file. This is
fixed in v9.51.(CVE-2020-16302)
- A buffer overflow vulnerability in pcx_write_rle() in
contrib/japanese/gdev10v.c of Artifex Software
GhostScript v9.50 allows a remote attacker to cause a
denial of service via a crafted PDF file. This is fixed
in v9.51.(CVE-2020-16305)
- A buffer overflow vulnerability in p_print_image() in
devices/gdevcdj.c of Artifex Software GhostScript v9.50
allows a remote attacker to cause a denial of service
via a crafted PDF file. This is fixed in
v9.51.(CVE-2020-16308)
- A buffer overflow vulnerability in
lxm5700m_print_page() in devices/gdevlxm.c of Artifex
Software GhostScript v9.50 allows a remote attacker to
cause a denial of service via a crafted eps file. This
is fixed in v9.51.(CVE-2020-16309)
- A division by zero vulnerability in dot24_print_page()
in devices/gdevdm24.c of Artifex Software GhostScript
v9.50 allows a remote attacker to cause a denial of
service via a crafted PDF file. This is fixed in
v9.51.(CVE-2020-16310)
- A buffer overflow vulnerability in GetNumSameData() in
contrib/lips4/gdevlips.c of Artifex Software
GhostScript v9.50 allows a remote attacker to cause a
denial of service via a crafted PDF file. This is fixed
in v9.51.(CVE-2020-17538)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-1041
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?fdc33012");
script_set_attribute(attribute:"solution", value:
"Update the affected ghostscript packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-17538");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"patch_publication_date", value:"2021/01/05");
script_set_attribute(attribute:"plugin_publication_date", value:"2021/01/05");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:ghostscript");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:ghostscript-fonts");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:uvp:3.0.2.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2021-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (uvp != "3.0.2.0") audit(AUDIT_OS_NOT, "EulerOS Virtualization 3.0.2.0");
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("aarch64" >!< cpu) audit(AUDIT_ARCH_NOT, "aarch64", cpu);
flag = 0;
pkgs = ["ghostscript-9.07-31.6.h20",
"ghostscript-fonts-5.50-32"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ghostscript");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo