Mandriva Linux Security Advisory : ghostscript (MDVSA-2010:102)

High Nessus Plugin ID 46680


The remote Mandriva Linux host is missing one or more security updates.


A vulnerability has been found and corrected in ghostscript :

Stack-based buffer overflow in the parser function in GhostScript 8.70 and 8.64 allows context-dependent attackers to execute arbitrary code via a crafted PostScript file (CVE-2010-1869).

Packages for 2008.0 and 2009.0 are provided due to the Extended Maintenance Program for those products.

The updated packages have been patched to correct this issue.


Update the affected packages.

Plugin Details

Severity: High

ID: 46680

File Name: mandriva_MDVSA-2010-102.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2010/05/20

Modified: 2016/05/17

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:ghostscript, p-cpe:/a:mandriva:linux:ghostscript-X, p-cpe:/a:mandriva:linux:ghostscript-common, p-cpe:/a:mandriva:linux:ghostscript-doc, p-cpe:/a:mandriva:linux:ghostscript-dvipdf, p-cpe:/a:mandriva:linux:ghostscript-module-X, p-cpe:/a:mandriva:linux:lib64gs8, p-cpe:/a:mandriva:linux:lib64gs8-devel, p-cpe:/a:mandriva:linux:lib64ijs1, p-cpe:/a:mandriva:linux:lib64ijs1-devel, p-cpe:/a:mandriva:linux:libgs8, p-cpe:/a:mandriva:linux:libgs8-devel, p-cpe:/a:mandriva:linux:libijs1, p-cpe:/a:mandriva:linux:libijs1-devel, cpe:/o:mandriva:linux:2008.0, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2009.1, cpe:/o:mandriva:linux:2010.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/05/19

Reference Information

CVE: CVE-2010-1869

BID: 40103

MDVSA: 2010:102