This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
A ghostscript package fixing a command execution vulnerability is now
GNU Ghostscript is an interpreter for the PostScript language, and is
often used when printing to printers that do not have their own
built-in PostScript interpreter.
A flaw has been discovered in the way Ghostscript validates some
PostScript commands. This flaw allows an attacker to force commands to
be executed by a print spooler by submitting a malicious print job.
Note that using the -dSAFER option is not sufficient to prevent
Users of Ghostscript are advised to upgrade to these updated packages,
which are not vulnerable to this issue.
See also :
Update the affected ghostscript package.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false