TencentOS Server 3: ghostscript (TSSA-2025:0355)

high Nessus Plugin ID 238899

Synopsis

The remote TencentOS Server 3 host is missing one or more security updates.

Description

The version of Tencent Linux installed on the remote TencentOS Server 3 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2025:0355 advisory.

Package updates are available for TencentOS Server 3 that fix the following vulnerabilities:

CVE-2020-27792:
A heap-based buffer overwrite vulnerability was found in GhostScript's lp8000_print_page() function in the gdevlp8k.c file. This flaw allows an attacker to trick a user into opening a crafted PDF file, triggering the heap buffer overflow that could lead to memory corruption or a denial of service.

CVE-2023-46751:
An issue was discovered in the function gdev_prn_open_printer_seekable() in Artifex Ghostscript through 10.02.0 allows remote attackers to crash the application via a dangling pointer.

CVE-2024-46951:
An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0. An unchecked Implementation pointer in Pattern color space could lead to arbitrary code execution.

CVE-2024-46952:
An issue was discovered in pdf/pdf_xref.c in Artifex Ghostscript before 10.04.0. There is a buffer overflow during handling of a PDF XRef stream (related to W array values).

CVE-2024-46953:
An issue was discovered in base/gsdevice.c in Artifex Ghostscript before 10.04.0. An integer overflow when parsing the filename format string (for the output filename) results in path truncation, and possible path traversal and code execution.

CVE-2024-46954:
An issue was discovered in decode_utf8 in base/gp_utf8.c in Artifex Ghostscript before 10.04.0. Overlong UTF-8 encoding leads to possible ../ directory traversal.

CVE-2024-46956:
An issue was discovered in psi/zfile.c in Artifex Ghostscript before 10.04.0. Out-of-bounds data access in filenameforall can lead to arbitrary code execution.

Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://mirrors.tencent.com/tlinux/errata/tssa-20250355.xml

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27792

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46751

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46951

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46952

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46953

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46954

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46956

Plugin Details

Severity: High

ID: 238899

File Name: tencentos_TSSA_2025_0355.nasl

Version: 1.1

Type: local

Published: 6/16/2025

Updated: 6/16/2025

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:tencent:tencentos_server:ghostscript, cpe:/o:tencent:tencentos_server:3

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 4/30/2025

Vulnerability Publication Date: 4/30/2025