How to Buy
This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
A ghostscript package fixing a command execution vulnerability is now
GNU Ghostscript is an interpreter for the PostScript language, and is
often used when printing to printers that do not have their own
built-in PostScript interpreter.
A flaw has been discovered in the way Ghostscript validates some
PostScript commands. This flaw allows an attacker to force commands to
be executed by a print spooler by submitting a malicious print job.
Note that using the -dSAFER option is not sufficient to prevent
Users of Ghostscript are advised to upgrade to these updated packages,
which are not vulnerable to this issue.
See also :
Update the affected ghostscript package.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12399 ()
CVE ID: CVE-2003-0354
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.