CVE-2023-28879

In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written.
References
Link Resource
http://www.openwall.com/lists/oss-security/2023/04/12/4
https://bugs.ghostscript.com/show_bug.cgi?id=706494 Exploit Vendor Advisory
https://ghostscript.readthedocs.io/en/latest/News.html Release Notes
https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=37ed5022cecd584de868933b5b60da2e995b3179
https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN/
https://security.gentoo.org/glsa/202309-03
https://www.debian.org/security/2023/dsa-5383 Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/04/12/4
https://bugs.ghostscript.com/show_bug.cgi?id=706494 Exploit Vendor Advisory
https://ghostscript.readthedocs.io/en/latest/News.html Release Notes
https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=37ed5022cecd584de868933b5b60da2e995b3179
https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN/
https://security.gentoo.org/glsa/202309-03
https://www.debian.org/security/2023/dsa-5383 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:56

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2023/04/12/4 - () http://www.openwall.com/lists/oss-security/2023/04/12/4 -
References () https://bugs.ghostscript.com/show_bug.cgi?id=706494 - Exploit, Vendor Advisory () https://bugs.ghostscript.com/show_bug.cgi?id=706494 - Exploit, Vendor Advisory
References () https://ghostscript.readthedocs.io/en/latest/News.html - Release Notes () https://ghostscript.readthedocs.io/en/latest/News.html - Release Notes
References () https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=37ed5022cecd584de868933b5b60da2e995b3179 - () https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=37ed5022cecd584de868933b5b60da2e995b3179 -
References () https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN/ -
References () https://security.gentoo.org/glsa/202309-03 - () https://security.gentoo.org/glsa/202309-03 -
References () https://www.debian.org/security/2023/dsa-5383 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5383 - Third Party Advisory

15 Apr 2023, 04:16

Type Values Removed Values Added
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN/ -
  • (MLIST) http://www.openwall.com/lists/oss-security/2023/04/12/4 -
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html - Mailing List, Third Party Advisory
  • (DEBIAN) https://www.debian.org/security/2023/dsa-5383 - Third Party Advisory
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2/ -
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE/ -
References (MISC) https://ghostscript.readthedocs.io/en/latest/News.html - (MISC) https://ghostscript.readthedocs.io/en/latest/News.html - Release Notes
References (MISC) https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=37ed5022cecd584de868933b5b60da2e995b3179 - (MISC) https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=37ed5022cecd584de868933b5b60da2e995b3179 - Patch
References (MISC) https://bugs.ghostscript.com/show_bug.cgi?id=706494 - (MISC) https://bugs.ghostscript.com/show_bug.cgi?id=706494 - Exploit, Vendor Advisory
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*

31 Mar 2023, 18:42

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-31 17:15

Updated : 2025-02-14 20:15


NVD link : CVE-2023-28879

Mitre link : CVE-2023-28879

CVE.ORG link : CVE-2023-28879


JSON object : View

Products Affected

artifex

  • ghostscript

debian

  • debian_linux
CWE
CWE-787

Out-of-bounds Write