Mandriva Linux Security Advisory : ghostscript (MDVSA-2010:136)

High Nessus Plugin ID 48194


The remote Mandriva Linux host is missing one or more security updates.


Multiple vulnerabilities has been found and corrected in ghostscript :

Buffer overflow in gs/psi/iscan.c in Ghostscript 8.64 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document containing a long name (CVE-2009-4897).

Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter (CVE-2010-1628).

As a precaution ghostscriptc has been rebuilt to link against the system libpng library which was fixed with MDVSA-2010:133

The updated packages have been patched to correct these issues.


Update the affected packages.

Plugin Details

Severity: High

ID: 48194

File Name: mandriva_MDVSA-2010-136.nasl

Version: $Revision: 1.8 $

Type: local

Published: 2010/07/30

Modified: 2013/06/01

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:ghostscript, p-cpe:/a:mandriva:linux:ghostscript-X, p-cpe:/a:mandriva:linux:ghostscript-common, p-cpe:/a:mandriva:linux:ghostscript-doc, p-cpe:/a:mandriva:linux:ghostscript-dvipdf, p-cpe:/a:mandriva:linux:ghostscript-module-X, p-cpe:/a:mandriva:linux:lib64gs8, p-cpe:/a:mandriva:linux:lib64gs8-devel, p-cpe:/a:mandriva:linux:lib64ijs1, p-cpe:/a:mandriva:linux:lib64ijs1-devel, p-cpe:/a:mandriva:linux:libgs8, p-cpe:/a:mandriva:linux:libgs8-devel, p-cpe:/a:mandriva:linux:libijs1, p-cpe:/a:mandriva:linux:libijs1-devel, cpe:/o:mandriva:linux:2010.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/07/15

Reference Information

CVE: CVE-2009-4897, CVE-2010-1628

BID: 40107

MDVSA: 2010:136