Stack-based buffer overflow in the errprintf function in base/gsmisc.c in ghostscript 8.64 through 8.70 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file, as originally reported for debug logging code in gdevcups.c in the CUPS output driver.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.ghostscript.com/show_bug.cgi?id=690829 - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html - | |
References | () http://osvdb.org/61140 - | |
References | () http://secunia.com/advisories/37851 - Vendor Advisory | |
References | () http://secunia.com/advisories/40580 - | |
References | () http://security.gentoo.org/glsa/glsa-201412-17.xml - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:134 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:135 - | |
References | () http://www.openwall.com/lists/oss-security/2009/12/18/1 - | |
References | () http://www.openwall.com/lists/oss-security/2009/12/18/2 - | |
References | () http://www.securityfocus.com/bid/37410 - Exploit | |
References | () http://www.ubuntu.com/usn/USN-961-1 - | |
References | () http://www.vupen.com/english/advisories/2009/3597 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=540760 - |
Information
Published : 2009-12-21 16:30
Updated : 2024-11-21 01:09
NVD link : CVE-2009-4270
Mitre link : CVE-2009-4270
CVE.ORG link : CVE-2009-4270
JSON object : View
Products Affected
ghostscript
- ghostscript
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer