openSUSE Security Update : ghostscript (openSUSE-2018-157)

high Nessus Plugin ID 106744

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for ghostscript fixes several security issues :

- CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document (bsc#1050879).

- CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get function in jbig2_huffman.c which allowed for DoS (bsc#1040643).

- CVE-2016-10317: The fill_threshhold_buffer function in base/gxht_thresh.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document (bsc#1032230).

- CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050891).

- CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050889).

- CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050888).

- CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050887).

- CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state structure, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document, related to an out-of-bounds read in the igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184).

- CVE-2016-10219: The intersect function in base/gxfill.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file (bsc#1032138).

This update was imported from the SUSE:SLE-12:Update update project.

Solution

Update the affected ghostscript packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1032138

https://bugzilla.opensuse.org/show_bug.cgi?id=1032230

https://bugzilla.opensuse.org/show_bug.cgi?id=1040643

https://bugzilla.opensuse.org/show_bug.cgi?id=1050879

https://bugzilla.opensuse.org/show_bug.cgi?id=1050887

https://bugzilla.opensuse.org/show_bug.cgi?id=1050888

https://bugzilla.opensuse.org/show_bug.cgi?id=1050889

https://bugzilla.opensuse.org/show_bug.cgi?id=1050891

https://bugzilla.opensuse.org/show_bug.cgi?id=1051184

Plugin Details

Severity: High

ID: 106744

File Name: openSUSE-2018-157.nasl

Version: 3.3

Type: local

Agent: unix

Published: 2/12/2018

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:2.3:o:novell:opensuse:42.3:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:ghostscript:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:ghostscript-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:ghostscript-debugsource:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:ghostscript-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:ghostscript-mini:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:ghostscript-mini-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:ghostscript-mini-debugsource:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:ghostscript-mini-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:ghostscript-x11:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:ghostscript-x11-debuginfo:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2/12/2018

Reference Information

CVE: CVE-2016-10219, CVE-2016-10317, CVE-2017-11714, CVE-2017-9216, CVE-2017-9612, CVE-2017-9726, CVE-2017-9727, CVE-2017-9739, CVE-2017-9835