Slackware 11.0 / 12.0 / current : espgs/ghostscript (SSA:2008-062-01)

medium Nessus Plugin ID 31324

Synopsis

The remote Slackware host is missing a security update.

Description

New espgs or ghostscript packages are available for 11.0, 12.0, and
-current to fix a buffer overflow.

Solution

Update the affected espgs and / or ghostscript packages.

See Also

http://www.nessus.org/u?65264f3c

Plugin Details

Severity: Medium

ID: 31324

File Name: Slackware_SSA_2008-062-01.nasl

Version: 1.17

Type: local

Published: 3/4/2008

Updated: 1/14/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:slackware:slackware_linux:espgs, p-cpe:/a:slackware:slackware_linux:ghostscript, cpe:/o:slackware:slackware_linux, cpe:/o:slackware:slackware_linux:11.0, cpe:/o:slackware:slackware_linux:12.0

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/2/2008

Exploitable With

Core Impact

Reference Information

CVE: CVE-2008-0411

BID: 28017

CWE: 119

SSA: 2008-062-01