Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 00:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00009.html - Mailing List, Third Party Advisory | |
References | () http://scary.beasts.org/security/CESA-2008-001.html - Exploit | |
References | () http://secunia.com/advisories/29101 - URL Repurposed | |
References | () http://secunia.com/advisories/29103 - URL Repurposed | |
References | () http://secunia.com/advisories/29112 - URL Repurposed | |
References | () http://secunia.com/advisories/29135 - URL Repurposed | |
References | () http://secunia.com/advisories/29147 - URL Repurposed | |
References | () http://secunia.com/advisories/29154 - URL Repurposed | |
References | () http://secunia.com/advisories/29169 - URL Repurposed | |
References | () http://secunia.com/advisories/29196 - URL Repurposed | |
References | () http://secunia.com/advisories/29314 - URL Repurposed | |
References | () http://secunia.com/advisories/29768 - URL Repurposed | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.370633 - Mailing List | |
References | () http://wiki.rpath.com/Advisories:rPSA-2008-0082 - Broken Link | |
References | () http://www.debian.org/security/2008/dsa-1510 - Patch | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200803-14.xml - Patch | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2008:055 - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2008-0155.html - URL Repurposed | |
References | () http://www.securityfocus.com/archive/1/488932/100/0/threaded - Broken Link, VDB Entry | |
References | () http://www.securityfocus.com/archive/1/488946/100/0/threaded - Broken Link, VDB Entry | |
References | () http://www.securityfocus.com/bid/28017 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1019511 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/usn-599-1 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2008/0693/references - Not Applicable | |
References | () https://issues.rpath.com/browse/RPL-2217 - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9557 - Broken Link | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00085.html - Release Notes, Third Party Advisory |
16 Feb 2024, 16:39
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:* |
cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:x86_64:*:*:*:*:* cpe:2.3:o:mandrakesoft:mandrake_linux:2008.0:*:x86_64:*:*:*:*:* |
References | () http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00009.html - Mailing List, Third Party Advisory | |
References | () http://secunia.com/advisories/29101 - URL Repurposed | |
References | () http://secunia.com/advisories/29103 - URL Repurposed | |
References | () http://secunia.com/advisories/29112 - URL Repurposed | |
References | () http://secunia.com/advisories/29135 - URL Repurposed | |
References | () http://secunia.com/advisories/29147 - URL Repurposed | |
References | () http://secunia.com/advisories/29154 - URL Repurposed | |
References | () http://secunia.com/advisories/29169 - URL Repurposed | |
References | () http://secunia.com/advisories/29196 - URL Repurposed | |
References | () http://secunia.com/advisories/29314 - URL Repurposed | |
References | () http://secunia.com/advisories/29768 - URL Repurposed | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.370633 - Mailing List | |
References | () http://wiki.rpath.com/Advisories:rPSA-2008-0082 - Broken Link | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200803-14.xml - Patch | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2008:055 - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2008-0155.html - URL Repurposed | |
References | () http://www.securityfocus.com/archive/1/488932/100/0/threaded - Broken Link, VDB Entry | |
References | () http://www.securityfocus.com/archive/1/488946/100/0/threaded - Broken Link, VDB Entry | |
References | () http://www.securityfocus.com/bid/28017 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1019511 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/usn-599-1 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2008/0693/references - Not Applicable | |
References | () https://issues.rpath.com/browse/RPL-2217 - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9557 - Broken Link | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00085.html - Release Notes, Third Party Advisory |
Information
Published : 2008-02-28 21:44
Updated : 2024-11-21 00:42
NVD link : CVE-2008-0411
Mitre link : CVE-2008-0411
CVE.ORG link : CVE-2008-0411
JSON object : View
Products Affected
mandrakesoft
- mandrakesoft_corporate_server
- mandrake_linux_corporate_server
- mandrake_linux
suse
- suse_open_enterprise_server
- open_suse
- suse_linux
- novell_linux_pos
rpath
- rpath_linux
debian
- debian_linux
ghostscript
- ghostscript
redhat
- enterprise_linux
- enterprise_linux_desktop_workstation
- desktop
- enterprise_linux_desktop
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer