CVE-2009-0583

Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
References
Link Resource
http://bugs.gentoo.org/show_bug.cgi?id=261087
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://secunia.com/advisories/34266 Vendor Advisory
http://secunia.com/advisories/34373 Vendor Advisory
http://secunia.com/advisories/34381 Vendor Advisory
http://secunia.com/advisories/34393 Vendor Advisory
http://secunia.com/advisories/34398 Vendor Advisory
http://secunia.com/advisories/34418 Vendor Advisory
http://secunia.com/advisories/34437 Vendor Advisory
http://secunia.com/advisories/34443 Vendor Advisory
http://secunia.com/advisories/34469 Vendor Advisory
http://secunia.com/advisories/34729
http://secunia.com/advisories/35559
http://secunia.com/advisories/35569
http://securitytracker.com/id?1021868
http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1
http://support.avaya.com/elmodocs2/security/ASA-2009-098.htm
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0050 Vendor Advisory
http://www.auscert.org.au/render.html?it=10666 US Government Resource
http://www.debian.org/security/2009/dsa-1746 Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200903-37.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:095
http://www.mandriva.com/security/advisories?name=MDVSA-2009:096
http://www.redhat.com/support/errata/RHSA-2009-0345.html Vendor Advisory
http://www.securityfocus.com/archive/1/501994/100/0/threaded
http://www.securityfocus.com/bid/34184
http://www.ubuntu.com/usn/USN-743-1
http://www.vupen.com/english/advisories/2009/0776 Vendor Advisory
http://www.vupen.com/english/advisories/2009/0777 Vendor Advisory
http://www.vupen.com/english/advisories/2009/0816 Vendor Advisory
http://www.vupen.com/english/advisories/2009/1708
https://bugzilla.redhat.com/show_bug.cgi?id=487742 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49329
https://issues.rpath.com/browse/RPL-2991
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10795
https://usn.ubuntu.com/757-1/
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00770.html Vendor Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00772.html Vendor Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00887.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00916.html
http://bugs.gentoo.org/show_bug.cgi?id=261087
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://secunia.com/advisories/34266 Vendor Advisory
http://secunia.com/advisories/34373 Vendor Advisory
http://secunia.com/advisories/34381 Vendor Advisory
http://secunia.com/advisories/34393 Vendor Advisory
http://secunia.com/advisories/34398 Vendor Advisory
http://secunia.com/advisories/34418 Vendor Advisory
http://secunia.com/advisories/34437 Vendor Advisory
http://secunia.com/advisories/34443 Vendor Advisory
http://secunia.com/advisories/34469 Vendor Advisory
http://secunia.com/advisories/34729
http://secunia.com/advisories/35559
http://secunia.com/advisories/35569
http://securitytracker.com/id?1021868
http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1
http://support.avaya.com/elmodocs2/security/ASA-2009-098.htm
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0050 Vendor Advisory
http://www.auscert.org.au/render.html?it=10666 US Government Resource
http://www.debian.org/security/2009/dsa-1746 Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200903-37.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:095
http://www.mandriva.com/security/advisories?name=MDVSA-2009:096
http://www.redhat.com/support/errata/RHSA-2009-0345.html Vendor Advisory
http://www.securityfocus.com/archive/1/501994/100/0/threaded
http://www.securityfocus.com/bid/34184
http://www.ubuntu.com/usn/USN-743-1
http://www.vupen.com/english/advisories/2009/0776 Vendor Advisory
http://www.vupen.com/english/advisories/2009/0777 Vendor Advisory
http://www.vupen.com/english/advisories/2009/0816 Vendor Advisory
http://www.vupen.com/english/advisories/2009/1708
https://bugzilla.redhat.com/show_bug.cgi?id=487742 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49329
https://issues.rpath.com/browse/RPL-2991
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10795
https://usn.ubuntu.com/757-1/
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00770.html Vendor Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00772.html Vendor Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00887.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00916.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:5.50:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:7.05:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:7.07:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.15.2:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.54:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.56:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.57:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.61:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.62:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.63:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:argyllcms:argyllcms:*:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:0.7.0:beta_8:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:1.0.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:00

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?id=261087 - () http://bugs.gentoo.org/show_bug.cgi?id=261087 -
References () http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html -
References () http://secunia.com/advisories/34266 - Vendor Advisory () http://secunia.com/advisories/34266 - Vendor Advisory
References () http://secunia.com/advisories/34373 - Vendor Advisory () http://secunia.com/advisories/34373 - Vendor Advisory
References () http://secunia.com/advisories/34381 - Vendor Advisory () http://secunia.com/advisories/34381 - Vendor Advisory
References () http://secunia.com/advisories/34393 - Vendor Advisory () http://secunia.com/advisories/34393 - Vendor Advisory
References () http://secunia.com/advisories/34398 - Vendor Advisory () http://secunia.com/advisories/34398 - Vendor Advisory
References () http://secunia.com/advisories/34418 - Vendor Advisory () http://secunia.com/advisories/34418 - Vendor Advisory
References () http://secunia.com/advisories/34437 - Vendor Advisory () http://secunia.com/advisories/34437 - Vendor Advisory
References () http://secunia.com/advisories/34443 - Vendor Advisory () http://secunia.com/advisories/34443 - Vendor Advisory
References () http://secunia.com/advisories/34469 - Vendor Advisory () http://secunia.com/advisories/34469 - Vendor Advisory
References () http://secunia.com/advisories/34729 - () http://secunia.com/advisories/34729 -
References () http://secunia.com/advisories/35559 - () http://secunia.com/advisories/35559 -
References () http://secunia.com/advisories/35569 - () http://secunia.com/advisories/35569 -
References () http://securitytracker.com/id?1021868 - () http://securitytracker.com/id?1021868 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1 -
References () http://support.avaya.com/elmodocs2/security/ASA-2009-098.htm - () http://support.avaya.com/elmodocs2/security/ASA-2009-098.htm -
References () http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0050 - Vendor Advisory () http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0050 - Vendor Advisory
References () http://www.auscert.org.au/render.html?it=10666 - US Government Resource () http://www.auscert.org.au/render.html?it=10666 - US Government Resource
References () http://www.debian.org/security/2009/dsa-1746 - Vendor Advisory () http://www.debian.org/security/2009/dsa-1746 - Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200903-37.xml - () http://www.gentoo.org/security/en/glsa/glsa-200903-37.xml -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:095 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:095 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:096 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:096 -
References () http://www.redhat.com/support/errata/RHSA-2009-0345.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2009-0345.html - Vendor Advisory
References () http://www.securityfocus.com/archive/1/501994/100/0/threaded - () http://www.securityfocus.com/archive/1/501994/100/0/threaded -
References () http://www.securityfocus.com/bid/34184 - () http://www.securityfocus.com/bid/34184 -
References () http://www.ubuntu.com/usn/USN-743-1 - () http://www.ubuntu.com/usn/USN-743-1 -
References () http://www.vupen.com/english/advisories/2009/0776 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/0776 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/0777 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/0777 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/0816 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/0816 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/1708 - () http://www.vupen.com/english/advisories/2009/1708 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=487742 - Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=487742 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/49329 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/49329 -
References () https://issues.rpath.com/browse/RPL-2991 - () https://issues.rpath.com/browse/RPL-2991 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10795 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10795 -
References () https://usn.ubuntu.com/757-1/ - () https://usn.ubuntu.com/757-1/ -
References () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00770.html - Vendor Advisory () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00770.html - Vendor Advisory
References () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00772.html - Vendor Advisory () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00772.html - Vendor Advisory
References () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00887.html - () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00887.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00916.html - () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00916.html -

Information

Published : 2009-03-23 20:00

Updated : 2024-11-21 01:00


NVD link : CVE-2009-0583

Mitre link : CVE-2009-0583

CVE.ORG link : CVE-2009-0583


JSON object : View

Products Affected

ghostscript

  • ghostscript

argyllcms

  • argyllcms
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer