CentOS 3 : ghostscript (CESA-2005:081)

high Nessus Plugin ID 21797

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated ghostscript packages that fix a PDF output issue and a temporary file security bug are now available.

This update has been rated as having low security impact by the Red Hat Security Response Team.

Ghostscript is a program for displaying PostScript files or printing them to non-PostScript printers.

A bug was found in the way several of Ghostscript's utility scripts created temporary files. A local user could cause these utilities to overwrite files that the victim running the utility has write access to. The Common Vulnerabilities and Exposures project assigned the name CVE-2004-0967 to this issue.

Additionally, this update addresses the following issue :

A problem has been identified in the PDF output driver, which can cause output to be delayed indefinitely on some systems. The fix has been backported from GhostScript 7.07.

All users of ghostscript should upgrade to these updated packages, which contain backported patches to resolve these issues.

Solution

Update the affected ghostscript packages.

See Also

http://www.nessus.org/u?3e06f507

http://www.nessus.org/u?82abaa6c

http://www.nessus.org/u?1f43d218

Plugin Details

Severity: High

ID: 21797

File Name: centos_RHSA-2005-081.nasl

Version: 1.19

Type: local

Agent: unix

Published: 7/3/2006

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:ghostscript, p-cpe:/a:centos:centos:ghostscript-devel, p-cpe:/a:centos:centos:hpijs, cpe:/o:centos:centos:3

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/28/2005

Vulnerability Publication Date: 12/31/2004

Reference Information

CVE: CVE-2004-0467, CVE-2004-0967

RHSA: 2005:081