Rapid7 Vulnerability & Exploit Database

RHSA-2009:0421: ghostscript security update

Back to Search

RHSA-2009:0421: ghostscript security update

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
04/14/2009
Created
07/25/2018
Added
09/12/2009
Modified
07/04/2017

Description

Ghostscript is a set of software that provides a PostScript interpreter, aset of C procedures (the Ghostscript library, which implements the graphicscapabilities in the PostScript language) and an interpreter for PortableDocument Format (PDF) files.It was discovered that the Red Hat Security Advisory RHSA-2009:0345 did notaddress all possible integer overflow flaws in Ghostscript's InternationalColor Consortium Format library (icclib). Using specially-crafted ICCprofiles, an attacker could create a malicious PostScript or PDF file withembedded images that could cause Ghostscript to crash or, potentially,execute arbitrary code when opened. (CVE-2009-0792)A buffer overflow flaw and multiple missing boundary checks were found inGhostscript. An attacker could create a specially-crafted PostScript or PDFfile that could cause Ghostscript to crash or, potentially, executearbitrary code when opened. (CVE-2008-6679, CVE-2007-6725, CVE-2009-0196)Red Hat would like to thank Alin Rad Pop of Secunia Research forresponsibly reporting the CVE-2009-0196 flaw.Users of ghostscript are advised to upgrade to these updated packages,which contain backported patches to correct these issues.

Solution(s)

  • redhat-upgrade-ghostscript
  • redhat-upgrade-ghostscript-devel
  • redhat-upgrade-ghostscript-gtk

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;