Rapid7 Vulnerability & Exploit Database

Ubuntu: USN-3272-2: Ghostscript regression

Back to Search

Ubuntu: USN-3272-2: Ghostscript regression

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
05/16/2017
Created
07/25/2018
Added
05/17/2017
Modified
07/09/2020

Description

USN-3272-1 fixed vulnerabilities in Ghostscript. This change introduced a regression when the DELAYBIND feature is used with the eqproc command. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that Ghostscript improperly handled parameters to the rsdparams and eqproc commands. An attacker could use these to craft a malicious document that could disable -dSAFER protections, thereby allowing the execution of arbitrary code, or cause a denial of service (application crash). (CVE-2017-8291)

Kamil Frankowicz discovered a use-after-free vulnerability in the color management module of Ghostscript. An attacker could use this to cause a denial of service (application crash). (CVE-2016-10217)

Kamil Frankowicz discovered a divide-by-zero error in the scan conversion code in Ghostscript. An attacker could use this to cause a denial of service (application crash). (CVE-2016-10219)

Kamil Frankowicz discovered multiple NULL pointer dereference errors in Ghostscript. An attacker could use these to cause a denial of service (application crash). (CVE-2016-10220,CVE-2017-5951,CVE-2017-7207)

Solution(s)

  • ubuntu-upgrade-ghostscript
  • ubuntu-upgrade-ghostscript-x
  • ubuntu-upgrade-libgs9
  • ubuntu-upgrade-libgs9-common

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;