Huawei EulerOS 'ghostscript' package buffer overflow vulnerabilities. Update to avoid data corruption and denial of service
Reporter | Title | Published | Views | Family All 154 |
---|---|---|---|---|
![]() | Moderate: ghostscript security and bug fix update | 7 Nov 202300:00 | – | almalinux |
![]() | Moderate: ghostscript security and bug fix update | 14 Nov 202300:00 | – | almalinux |
![]() | Moderate: Red Hat Security Advisory: ghostscript security and bug fix update | 7 Nov 202308:21 | – | redhat |
![]() | Moderate: Red Hat Security Advisory: ghostscript security and bug fix update | 14 Nov 202315:49 | – | redhat |
![]() | EulerOS 2.0 SP8 : ghostscript (EulerOS-SA-2023-3126) | 16 Jan 202400:00 | – | nessus |
![]() | EulerOS Virtualization 3.0.6.0 : ghostscript (EulerOS-SA-2023-3430) | 16 Jan 202400:00 | – | nessus |
![]() | RHEL 9 : ghostscript (RHSA-2023:6544) | 7 Nov 202300:00 | – | nessus |
![]() | Oracle Linux 8 : ghostscript (ELSA-2023-7053) | 21 Nov 202300:00 | – | nessus |
![]() | Oracle Linux 9 : ghostscript (ELSA-2023-6544) | 16 Nov 202300:00 | – | nessus |
![]() | RHEL 8 : ghostscript (RHSA-2023:7053) | 14 Nov 202300:00 | – | nessus |
Source | Link |
---|---|
developer | www.developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html |
# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2023.3430");
script_cve_id("CVE-2023-28879", "CVE-2023-38559");
script_tag(name:"creation_date", value:"2023-12-15 04:20:35 +0000 (Fri, 15 Dec 2023)");
script_version("2024-02-05T14:36:57+0000");
script_tag(name:"last_modification", value:"2024-02-05 14:36:57 +0000 (Mon, 05 Feb 2024)");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2023-04-08 02:24:20 +0000 (Sat, 08 Apr 2023)");
script_name("Huawei EulerOS: Security Advisory for ghostscript (EulerOS-SA-2023-3430)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2023 Greenbone AG");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=EULEROSVIRTARM64\-3\.0\.6\.0");
script_xref(name:"Advisory-ID", value:"EulerOS-SA-2023-3430");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html?secId=EulerOS-SA-2023-3430");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS 'ghostscript' package(s) announced via the EulerOS-SA-2023-3430 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written.(CVE-2023-28879)
A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.(CVE-2023-38559)");
script_tag(name:"affected", value:"'ghostscript' package(s) on Huawei EulerOS Virtualization for ARM 64 3.0.6.0.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROSVIRTARM64-3.0.6.0") {
if(!isnull(res = isrpmvuln(pkg:"ghostscript", rpm:"ghostscript~9.25~1.h13.eulerosv2r8", rls:"EULEROSVIRTARM64-3.0.6.0"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libgs", rpm:"libgs~9.25~1.h13.eulerosv2r8", rls:"EULEROSVIRTARM64-3.0.6.0"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo