Scientific Linux Security Update : ghostscript on SL3.x, SL4.x, SL5.x i386/x86_64

medium Nessus Plugin ID 60366

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

Chris Evans from the Google Security Team reported a stack-based buffer overflow flaw in Ghostscript's zseticcspace() function. An attacker could create a malicious PostScript file that would cause Ghostscript to execute arbitrary code when opened. (CVE-2008-0411)

These updated packages also fix a bug, which prevented the pxlmono printer driver from producing valid output on Scientific Linux 4.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?5993ceef

Plugin Details

Severity: Medium

ID: 60366

File Name: sl_20080227_ghostscript_on_SL3_x.nasl

Version: 1.5

Type: local

Agent: unix

Published: 8/1/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/27/2008

Exploitable With

Core Impact

Reference Information

CVE: CVE-2008-0411

CWE: 119