Mandriva Linux Security Advisory : ghostscript (MDVSA-2010:136)

high Nessus Plugin ID 48194

Language:

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerabilities has been found and corrected in ghostscript :

Buffer overflow in gs/psi/iscan.c in Ghostscript 8.64 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document containing a long name (CVE-2009-4897).

Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter (CVE-2010-1628).

As a precaution ghostscriptc has been rebuilt to link against the system libpng library which was fixed with MDVSA-2010:133

The updated packages have been patched to correct these issues.

Solution

Update the affected packages.

Plugin Details

Severity: High

ID: 48194

File Name: mandriva_MDVSA-2010-136.nasl

Version: 1.11

Type: local

Published: 7/30/2010

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:ghostscript, p-cpe:/a:mandriva:linux:ghostscript-x, p-cpe:/a:mandriva:linux:ghostscript-common, p-cpe:/a:mandriva:linux:ghostscript-doc, p-cpe:/a:mandriva:linux:ghostscript-dvipdf, p-cpe:/a:mandriva:linux:ghostscript-module-x, p-cpe:/a:mandriva:linux:lib64gs8, p-cpe:/a:mandriva:linux:lib64gs8-devel, p-cpe:/a:mandriva:linux:lib64ijs1, p-cpe:/a:mandriva:linux:lib64ijs1-devel, p-cpe:/a:mandriva:linux:libgs8, p-cpe:/a:mandriva:linux:libgs8-devel, p-cpe:/a:mandriva:linux:libijs1, p-cpe:/a:mandriva:linux:libijs1-devel, cpe:/o:mandriva:linux:2010.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/15/2010

Reference Information

CVE: CVE-2009-4897, CVE-2010-1628

BID: 40107

MDVSA: 2010:136