Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.801336
Category:Buffer overflow
Title:Ghostscript Parser Buffer Overflow Vulnerabilities - Windows
Summary:Ghostscript is prone to a buffer overflow vulnerability.
Description:Summary:
Ghostscript is prone to a buffer overflow vulnerability.

Vulnerability Insight:
These flaws are due to:

- Boundary error in the 'parser()' which allows the attackers to
execute arbitrary code via a crafted PostScript file.

- Buffer overflow and memory corruption errors when processing a recursive
procedure invocations, which could be exploited to crash an affected
application or execute arbitrary code.

Vulnerability Impact:
Successful exploitation allows the attacker to execute arbitrary
code in the context of the affected application and can cause denial of service.

Affected Software/OS:
Ghostscript version 8.70 and 8.64 on Windows.

Solution:
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-1869
BugTraq ID: 40103
http://www.securityfocus.com/bid/40103
Bugtraq: 20100512 Multiple memory corruption vulnerabilities in Ghostscript (Google Search)
http://www.securityfocus.com/archive/1/511243/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDVSA-2010:102
http://www.checkpoint.com/defense/advisories/public/2010/cpai-10-May.html
http://www.securitytracker.com/id?1024003
http://secunia.com/advisories/39753
http://secunia.com/advisories/40580
SuSE Security Announcement: SUSE-SR:2010:014 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://www.ubuntu.com/usn/USN-961-1
http://www.vupen.com/english/advisories/2010/1138
http://www.vupen.com/english/advisories/2010/1195
Common Vulnerability Exposure (CVE) ID: CVE-2010-1628
20100511 Multiple memory corruption vulnerabilities in Ghostscript
http://seclists.org/fulldisclosure/2010/May/134
20100512 Multiple memory corruption vulnerabilities in Ghostscript
39753
40107
http://www.securityfocus.com/bid/40107
40580
ADV-2010-1138
GLSA-201412-17
http://security.gentoo.org/glsa/glsa-201412-17.xml
MDVSA-2010:134
http://www.mandriva.com/security/advisories?name=MDVSA-2010:134
SUSE-SR:2010:014
USN-961-1
[oss-security] 20100511 Re: CVE assignment: ghostscript stack-based overflow
http://www.openwall.com/lists/oss-security/2010/05/12/1
[oss-security] 20100518 Re: CVE assignment: ghostscript stack-based overflow
http://www.openwall.com/lists/oss-security/2010/05/18/7
http://bugs.ghostscript.com/show_bug.cgi?id=691295
https://bugs.launchpad.net/ubuntu/+source/ghostscript/+bug/546009
CopyrightCopyright (C) 2010 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.