Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.843168
Category:Ubuntu Local Security Checks
Title:Ubuntu Update for ghostscript USN-3272-2
Summary:The remote host is missing an update for the 'ghostscript'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'ghostscript'
package(s) announced via the referenced advisory.

Vulnerability Insight:
USN-3272-1 fixed vulnerabilities in
Ghostscript. This change introduced a regression when the DELAYBIND feature is
used with the eqproc command. This update fixes the problem. We apologize for
the inconvenience. Original advisory details: It was discovered that Ghostscript
improperly handled parameters to the rsdparams and eqproc commands. An attacker
could use these to craft a malicious document that could disable -dSAFER
protections, thereby allowing the execution of arbitrary code, or cause a denial
of service (application crash). (CVE-2017-8291) Kamil Frankowicz discovered a
use-after-free vulnerability in the color management module of Ghostscript. An
attacker could use this to cause a denial of service (application crash).
(CVE-2016-10217) Kamil Frankowicz discovered a divide-by-zero error in the scan
conversion code in Ghostscript. An attacker could use this to cause a denial of
service (application crash). (CVE-2016-10219) Kamil Frankowicz discovered
multiple NULL pointer dereference errors in Ghostscript. An attacker could use
these to cause a denial of service (application crash). (CVE-2016-10220,
CVE-2017-5951, CVE-2017-7207)

Affected Software/OS:
ghostscript on Ubuntu 17.04,
Ubuntu 16.10,
Ubuntu 16.04 LTS,
Ubuntu 14.04 LTS

Solution:
Please Install the Updated Packages.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-8291
BugTraq ID: 98476
http://www.securityfocus.com/bid/98476
Debian Security Information: DSA-3838 (Google Search)
http://www.debian.org/security/2017/dsa-3838
https://www.exploit-db.com/exploits/41955/
https://security.gentoo.org/glsa/201708-06
http://openwall.com/lists/oss-security/2017/04/28/2
https://bugs.ghostscript.com/show_bug.cgi?id=697808
https://bugzilla.redhat.com/show_bug.cgi?id=1446063
https://bugzilla.suse.com/show_bug.cgi?id=1036453
RedHat Security Advisories: RHSA-2017:1230
https://access.redhat.com/errata/RHSA-2017:1230
Common Vulnerability Exposure (CVE) ID: CVE-2017-5951
BugTraq ID: 98665
http://www.securityfocus.com/bid/98665
https://bugs.ghostscript.com/show_bug.cgi?id=697548
Common Vulnerability Exposure (CVE) ID: CVE-2017-7207
BugTraq ID: 96995
http://www.securityfocus.com/bid/96995
RedHat Security Advisories: RHSA-2017:2180
https://access.redhat.com/errata/RHSA-2017:2180
http://www.securitytracker.com/id/1039071
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.