Vulnerabilities > CVE-2009-0584 - Numeric Errors vulnerability in multiple products

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
argyllcms
ghostscript
CWE-189
critical
nessus

Summary

icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_1_GHOSTSCRIPT-DEVEL-090312.NASL
    descriptionInteger overflows and missing upper bounds checks in Ghostscript
    last seen2020-06-01
    modified2020-06-02
    plugin id40219
    published2009-07-21
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/40219
    titleopenSUSE Security Update : ghostscript-devel (ghostscript-devel-592)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update ghostscript-devel-592.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(40219);
      script_version("1.11");
      script_cvs_date("Date: 2019/10/25 13:36:34");
    
      script_cve_id("CVE-2009-0583", "CVE-2009-0584");
    
      script_name(english:"openSUSE Security Update : ghostscript-devel (ghostscript-devel-592)");
      script_summary(english:"Check for the ghostscript-devel-592 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Integer overflows and missing upper bounds checks in Ghostscript's ICC
    library potentially allowed attackers to crash Ghostscript or even
    cause execution of arbitrary code via specially crafted PS or PDF
    files (CVE-2009-0583, CVE-2009-0584)."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=483303"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected ghostscript-devel packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_cwe_id(119, 189);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-fonts-other");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-fonts-rus");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-fonts-std");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-ijs-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-library");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-omni");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-x11");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgimpprint");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgimpprint-devel");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:11.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2009/03/12");
      script_set_attribute(attribute:"plugin_publication_date", value:"2009/07/21");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE11\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "11.1", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE11.1", reference:"ghostscript-devel-8.62-31.40.1") ) flag++;
    if ( rpm_check(release:"SUSE11.1", reference:"ghostscript-fonts-other-8.62-31.40.1") ) flag++;
    if ( rpm_check(release:"SUSE11.1", reference:"ghostscript-fonts-rus-8.62-31.40.1") ) flag++;
    if ( rpm_check(release:"SUSE11.1", reference:"ghostscript-fonts-std-8.62-31.40.1") ) flag++;
    if ( rpm_check(release:"SUSE11.1", reference:"ghostscript-ijs-devel-8.62-31.40.1") ) flag++;
    if ( rpm_check(release:"SUSE11.1", reference:"ghostscript-library-8.62-31.40.1") ) flag++;
    if ( rpm_check(release:"SUSE11.1", reference:"ghostscript-omni-8.62-31.40.1") ) flag++;
    if ( rpm_check(release:"SUSE11.1", reference:"ghostscript-x11-8.62-31.40.1") ) flag++;
    if ( rpm_check(release:"SUSE11.1", reference:"libgimpprint-4.2.7-31.40.1") ) flag++;
    if ( rpm_check(release:"SUSE11.1", reference:"libgimpprint-devel-4.2.7-31.40.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ghostscript-devel / ghostscript-fonts-other / ghostscript-fonts-rus / etc");
    }
    
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-743-1.NASL
    descriptionIt was discovered that Ghostscript contained multiple integer overflows in its ICC color management library. If a user or automated system were tricked into opening a crafted Postscript file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. (CVE-2009-0583) It was discovered that Ghostscript did not properly perform bounds checking in its ICC color management library. If a user or automated system were tricked into opening a crafted Postscript file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. (CVE-2009-0584). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id36471
    published2009-04-23
    reporterUbuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/36471
    titleUbuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : ghostscript, gs-gpl vulnerabilities (USN-743-1)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Ubuntu Security Notice USN-743-1. The text 
    # itself is copyright (C) Canonical, Inc. See 
    # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
    # trademark of Canonical, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(36471);
      script_version("1.15");
      script_cvs_date("Date: 2019/08/02 13:33:02");
    
      script_cve_id("CVE-2009-0583", "CVE-2009-0584");
      script_bugtraq_id(34184);
      script_xref(name:"USN", value:"743-1");
    
      script_name(english:"Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : ghostscript, gs-gpl vulnerabilities (USN-743-1)");
      script_summary(english:"Checks dpkg output for updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Ubuntu host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "It was discovered that Ghostscript contained multiple integer
    overflows in its ICC color management library. If a user or automated
    system were tricked into opening a crafted Postscript file, an
    attacker could cause a denial of service or execute arbitrary code
    with privileges of the user invoking the program. (CVE-2009-0583)
    
    It was discovered that Ghostscript did not properly perform bounds
    checking in its ICC color management library. If a user or automated
    system were tricked into opening a crafted Postscript file, an
    attacker could cause a denial of service or execute arbitrary code
    with privileges of the user invoking the program. (CVE-2009-0584).
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Ubuntu security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://usn.ubuntu.com/743-1/"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(119, 189);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:ghostscript");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:ghostscript-doc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:ghostscript-x");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:gs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:gs-aladdin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:gs-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:gs-esp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:gs-esp-x");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:gs-gpl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libgs-dev");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libgs-esp-dev");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libgs8");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:6.06:-:lts");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:7.10");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:8.04:-:lts");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:8.10");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2009/03/23");
      script_set_attribute(attribute:"plugin_publication_date", value:"2009/04/23");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"Ubuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Ubuntu Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("ubuntu.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Ubuntu/release");
    if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
    release = chomp(release);
    if (! ereg(pattern:"^(6\.06|7\.10|8\.04|8\.10)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 6.06 / 7.10 / 8.04 / 8.10", "Ubuntu " + release);
    if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
    
    flag = 0;
    
    if (ubuntu_check(osver:"6.06", pkgname:"gs", pkgver:"8.15-4ubuntu3.2")) flag++;
    if (ubuntu_check(osver:"6.06", pkgname:"gs-gpl", pkgver:"8.15-4ubuntu3.2")) flag++;
    if (ubuntu_check(osver:"7.10", pkgname:"ghostscript", pkgver:"8.61.dfsg.1~svn8187-0ubuntu3.5")) flag++;
    if (ubuntu_check(osver:"7.10", pkgname:"ghostscript-doc", pkgver:"8.61.dfsg.1~svn8187-0ubuntu3.5")) flag++;
    if (ubuntu_check(osver:"7.10", pkgname:"ghostscript-x", pkgver:"8.61.dfsg.1~svn8187-0ubuntu3.5")) flag++;
    if (ubuntu_check(osver:"7.10", pkgname:"gs", pkgver:"8.61.dfsg.1~svn8187-0ubuntu3.5")) flag++;
    if (ubuntu_check(osver:"7.10", pkgname:"gs-aladdin", pkgver:"8.61.dfsg.1~svn8187-0ubuntu3.5")) flag++;
    if (ubuntu_check(osver:"7.10", pkgname:"gs-common", pkgver:"8.61.dfsg.1~svn8187-0ubuntu3.5")) flag++;
    if (ubuntu_check(osver:"7.10", pkgname:"gs-esp", pkgver:"8.61.dfsg.1~svn8187-0ubuntu3.5")) flag++;
    if (ubuntu_check(osver:"7.10", pkgname:"gs-esp-x", pkgver:"8.61.dfsg.1~svn8187-0ubuntu3.5")) flag++;
    if (ubuntu_check(osver:"7.10", pkgname:"gs-gpl", pkgver:"8.61.dfsg.1~svn8187-0ubuntu3.5")) flag++;
    if (ubuntu_check(osver:"7.10", pkgname:"libgs-dev", pkgver:"8.61.dfsg.1~svn8187-0ubuntu3.5")) flag++;
    if (ubuntu_check(osver:"7.10", pkgname:"libgs-esp-dev", pkgver:"8.61.dfsg.1~svn8187-0ubuntu3.5")) flag++;
    if (ubuntu_check(osver:"7.10", pkgname:"libgs8", pkgver:"8.61.dfsg.1~svn8187-0ubuntu3.5")) flag++;
    if (ubuntu_check(osver:"8.04", pkgname:"ghostscript", pkgver:"8.61.dfsg.1-1ubuntu3.1")) flag++;
    if (ubuntu_check(osver:"8.04", pkgname:"ghostscript-doc", pkgver:"8.61.dfsg.1-1ubuntu3.1")) flag++;
    if (ubuntu_check(osver:"8.04", pkgname:"ghostscript-x", pkgver:"8.61.dfsg.1-1ubuntu3.1")) flag++;
    if (ubuntu_check(osver:"8.04", pkgname:"gs", pkgver:"8.61.dfsg.1-1ubuntu3.1")) flag++;
    if (ubuntu_check(osver:"8.04", pkgname:"gs-aladdin", pkgver:"8.61.dfsg.1-1ubuntu3.1")) flag++;
    if (ubuntu_check(osver:"8.04", pkgname:"gs-common", pkgver:"8.61.dfsg.1-1ubuntu3.1")) flag++;
    if (ubuntu_check(osver:"8.04", pkgname:"gs-esp", pkgver:"8.61.dfsg.1-1ubuntu3.1")) flag++;
    if (ubuntu_check(osver:"8.04", pkgname:"gs-esp-x", pkgver:"8.61.dfsg.1-1ubuntu3.1")) flag++;
    if (ubuntu_check(osver:"8.04", pkgname:"gs-gpl", pkgver:"8.61.dfsg.1-1ubuntu3.1")) flag++;
    if (ubuntu_check(osver:"8.04", pkgname:"libgs-dev", pkgver:"8.61.dfsg.1-1ubuntu3.1")) flag++;
    if (ubuntu_check(osver:"8.04", pkgname:"libgs-esp-dev", pkgver:"8.61.dfsg.1-1ubuntu3.1")) flag++;
    if (ubuntu_check(osver:"8.04", pkgname:"libgs8", pkgver:"8.61.dfsg.1-1ubuntu3.1")) flag++;
    if (ubuntu_check(osver:"8.10", pkgname:"ghostscript", pkgver:"8.63.dfsg.1-0ubuntu6.3")) flag++;
    if (ubuntu_check(osver:"8.10", pkgname:"ghostscript-doc", pkgver:"8.63.dfsg.1-0ubuntu6.3")) flag++;
    if (ubuntu_check(osver:"8.10", pkgname:"ghostscript-x", pkgver:"8.63.dfsg.1-0ubuntu6.3")) flag++;
    if (ubuntu_check(osver:"8.10", pkgname:"gs", pkgver:"8.63.dfsg.1-0ubuntu6.3")) flag++;
    if (ubuntu_check(osver:"8.10", pkgname:"gs-aladdin", pkgver:"8.63.dfsg.1-0ubuntu6.3")) flag++;
    if (ubuntu_check(osver:"8.10", pkgname:"gs-common", pkgver:"8.63.dfsg.1-0ubuntu6.3")) flag++;
    if (ubuntu_check(osver:"8.10", pkgname:"gs-esp", pkgver:"8.63.dfsg.1-0ubuntu6.3")) flag++;
    if (ubuntu_check(osver:"8.10", pkgname:"gs-esp-x", pkgver:"8.63.dfsg.1-0ubuntu6.3")) flag++;
    if (ubuntu_check(osver:"8.10", pkgname:"gs-gpl", pkgver:"8.63.dfsg.1-0ubuntu6.3")) flag++;
    if (ubuntu_check(osver:"8.10", pkgname:"libgs-dev", pkgver:"8.63.dfsg.1-0ubuntu6.3")) flag++;
    if (ubuntu_check(osver:"8.10", pkgname:"libgs-esp-dev", pkgver:"8.63.dfsg.1-0ubuntu6.3")) flag++;
    if (ubuntu_check(osver:"8.10", pkgname:"libgs8", pkgver:"8.63.dfsg.1-0ubuntu6.3")) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : ubuntu_report_get()
      );
      exit(0);
    }
    else
    {
      tested = ubuntu_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ghostscript / ghostscript-doc / ghostscript-x / gs / gs-aladdin / etc");
    }
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2009-311.NASL
    descriptionMultiple security vulnerabilities has been identified and fixed in ghostscript : A buffer underflow in Ghostscript
    last seen2020-06-01
    modified2020-06-02
    plugin id42997
    published2009-12-04
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/42997
    titleMandriva Linux Security Advisory : ghostscript (MDVSA-2009:311)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Mandriva Linux Security Advisory MDVSA-2009:311. 
    # The text itself is copyright (C) Mandriva S.A.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(42997);
      script_version("1.18");
      script_cvs_date("Date: 2019/08/02 13:32:52");
    
      script_cve_id(
        "CVE-2007-6725",
        "CVE-2008-3520",
        "CVE-2008-3522",
        "CVE-2008-6679",
        "CVE-2009-0196",
        "CVE-2009-0583",
        "CVE-2009-0584",
        "CVE-2009-0792"
      );
      script_bugtraq_id(
        31470,
        34184,
        34337,
        34340,
        34445
      );
      script_xref(name:"MDVSA", value:"2009:311");
    
      script_name(english:"Mandriva Linux Security Advisory : ghostscript (MDVSA-2009:311)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Mandriva Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Multiple security vulnerabilities has been identified and fixed in
    ghostscript :
    
    A buffer underflow in Ghostscript's CCITTFax decoding filter allows
    remote attackers to cause denial of service and possibly to execute
    arbitrary by using a crafted PDF file (CVE-2007-6725).
    
    Buffer overflow in Ghostscript's BaseFont writer module allows remote
    attackers to cause a denial of service and possibly to execute
    arbitrary code via a crafted Postscript file (CVE-2008-6679).
    
    Multiple interger overflows in Ghostsript's International Color
    Consortium Format Library (icclib) allows attackers to cause denial of
    service (heap-based buffer overflow and application crash) and
    possibly execute arbitrary code by using either a PostScript or PDF
    file with crafte embedded images (CVE-2009-0583, CVE-2009-0584).
    
    Multiple interger overflows in Ghostsript's International Color
    Consortium Format Library (icclib) allows attackers to cause denial of
    service (heap-based buffer overflow and application crash) and
    possibly execute arbitrary code by using either a PostScript or PDF
    file with crafte embedded images. Note: this issue exists because of
    an incomplete fix for CVE-2009-0583 (CVE-2009-0792).
    
    Heap-based overflow in Ghostscript's JBIG2 decoding library allows
    attackers to cause denial of service and possibly to execute arbitrary
    code by using a crafted PDF file (CVE-2009-0196).
    
    Multiple integer overflows in JasPer 1.900.1 might allow
    context-dependent attackers to have an unknown impact via a crafted
    image file, related to integer multiplication for memory allocation
    (CVE-2008-3520).
    
    Buffer overflow in the jas_stream_printf function in
    libjasper/base/jas_stream.c in JasPer 1.900.1 might allow
    context-dependent attackers to have an unknown impact via vectors
    related to the mif_hdr_put function and use of vsprintf
    (CVE-2008-3522).
    
    Previousely the ghostscript packages were statically built against a
    bundled and private copy of the jasper library. This update makes
    ghostscript link against the shared system jasper library which makes
    it easier to address presumptive future security issues in the jasper
    library.
    
    Packages for 2008.0 are provided for Corporate Desktop 2008.0
    customers
    
    This update provides fixes for that vulnerabilities."
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(119, 189);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ghostscript");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ghostscript-X");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ghostscript-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ghostscript-doc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ghostscript-dvipdf");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ghostscript-module-X");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64gs8");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64gs8-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64ijs1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64ijs1-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libgs8");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libgs8-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libijs1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libijs1-devel");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2008.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2009/12/03");
      script_set_attribute(attribute:"plugin_publication_date", value:"2009/12/04");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc.");
      script_family(english:"Mandriva Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
    if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"MDK2008.0", reference:"ghostscript-8.60-55.3mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", reference:"ghostscript-X-8.60-55.3mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", reference:"ghostscript-common-8.60-55.3mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", reference:"ghostscript-doc-8.60-55.3mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", reference:"ghostscript-dvipdf-8.60-55.3mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", reference:"ghostscript-module-X-8.60-55.3mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64gs8-8.60-55.3mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64gs8-devel-8.60-55.3mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64ijs1-0.35-55.3mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64ijs1-devel-0.35-55.3mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libgs8-8.60-55.3mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libgs8-devel-8.60-55.3mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libijs1-0.35-55.3mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libijs1-devel-0.35-55.3mdv2008.0", yank:"mdv")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2009-2883.NASL
    descriptionSecurity update for integer overflows (CVE-2009-0583) and upper bounds checks (CVE-2009-0584) in the ICC profile handling. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id35983
    published2009-03-22
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/35983
    titleFedora 9 : ghostscript-8.63-2.fc9 (2009-2883)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2009-2883.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(35983);
      script_version ("1.16");
      script_cvs_date("Date: 2019/08/02 13:32:29");
    
      script_cve_id("CVE-2009-0583", "CVE-2009-0584");
      script_bugtraq_id(34184);
      script_xref(name:"FEDORA", value:"2009-2883");
    
      script_name(english:"Fedora 9 : ghostscript-8.63-2.fc9 (2009-2883)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Security update for integer overflows (CVE-2009-0583) and upper bounds
    checks (CVE-2009-0584) in the ICC profile handling.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=487742"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=487744"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2009-March/021563.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?d59c95f0"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected ghostscript package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(119, 189);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:ghostscript");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:9");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2009/03/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2009/03/22");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^9([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 9.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC9", reference:"ghostscript-8.63-2.fc9")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ghostscript");
    }
    
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2009-181-01.NASL
    descriptionNew ghostscript packages are available for Slackware 12.1, 12.2, and -current to fix security issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id39567
    published2009-06-30
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/39567
    titleSlackware 12.1 / 12.2 / current : ghostscript (SSA:2009-181-01)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2009-3011.NASL
    descriptionMultiple integer overflows were found in the International Color Consortium Format Library (icclib). An attacker could use this flaw to potentially execute arbitrary code by requesting to translate a specially- crafted image file created on one device into another
    last seen2020-06-01
    modified2020-06-02
    plugin id37323
    published2009-04-23
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/37323
    titleFedora 10 : argyllcms-1.0.3-3.fc10 (2009-3011)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_GHOSTSCRIPT-DEVEL-090318.NASL
    descriptionInteger overflows and missing upper bounds checks in Ghostscript
    last seen2020-06-01
    modified2020-06-02
    plugin id41394
    published2009-09-24
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/41394
    titleSuSE 11 Security Update : Ghostscript (SAT Patch Number 636)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_0_GHOSTSCRIPT-DEVEL-090312.NASL
    descriptionInteger overflows and missing upper bounds checks in Ghostscript
    last seen2020-06-01
    modified2020-06-02
    plugin id39967
    published2009-07-21
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/39967
    titleopenSUSE Security Update : ghostscript-devel (ghostscript-devel-592)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2009-0345.NASL
    descriptionFrom Red Hat Security Advisory 2009:0345 : Updated ghostscript packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ghostscript is a set of software that provides a PostScript(TM) interpreter, a set of C procedures (the Ghostscript library, which implements the graphics capabilities in the PostScript language) and an interpreter for Portable Document Format (PDF) files. Multiple integer overflow flaws which could lead to heap-based buffer overflows, as well as multiple insufficient input validation flaws, were found in Ghostscript
    last seen2020-06-01
    modified2020-06-02
    plugin id67823
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67823
    titleOracle Linux 3 / 4 / 5 : ghostscript (ELSA-2009-0345)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2009-0345.NASL
    descriptionUpdated ghostscript packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ghostscript is a set of software that provides a PostScript(TM) interpreter, a set of C procedures (the Ghostscript library, which implements the graphics capabilities in the PostScript language) and an interpreter for Portable Document Format (PDF) files. Multiple integer overflow flaws which could lead to heap-based buffer overflows, as well as multiple insufficient input validation flaws, were found in Ghostscript
    last seen2020-06-01
    modified2020-06-02
    plugin id35966
    published2009-03-20
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35966
    titleCentOS 3 / 4 : ghostscript (CESA-2009:0345)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-757-1.NASL
    descriptionIt was discovered that Ghostscript contained a buffer underflow in its CCITTFax decoding filter. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. (CVE-2007-6725) It was discovered that Ghostscript contained a buffer overflow in the BaseFont writer module. If a user or automated system were tricked into opening a crafted Postscript file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. (CVE-2008-6679) It was discovered that Ghostscript contained additional integer overflows in its ICC color management library. If a user or automated system were tricked into opening a crafted Postscript or PDF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. (CVE-2009-0792) Alin Rad Pop discovered that Ghostscript contained a buffer overflow in the jbig2dec library. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. (CVE-2009-0196) USN-743-1 provided updated ghostscript and gs-gpl packages to fix two security vulnerabilities. This update corrects the same vulnerabilities in the gs-esp package. It was discovered that Ghostscript contained multiple integer overflows in its ICC color management library. If a user or automated system were tricked into opening a crafted Postscript file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. (CVE-2009-0583) It was discovered that Ghostscript did not properly perform bounds checking in its ICC color management library. If a user or automated system were tricked into opening a crafted Postscript file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. (CVE-2009-0584). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id37438
    published2009-04-23
    reporterUbuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/37438
    titleUbuntu 6.06 LTS / 8.04 LTS / 8.10 : ghostscript, gs-esp, gs-gpl vulnerabilities (USN-757-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1746.NASL
    descriptionTwo security issues have been discovered in ghostscript, the GPL Ghostscript PostScript/PDF interpreter. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2009-0583 Jan Lieskovsky discovered multiple integer overflows in the ICC library, which allow the execution of arbitrary code via crafted ICC profiles in PostScript files with embedded images. - CVE-2009-0584 Jan Lieskovsky discovered insufficient upper-bounds checks on certain variable sizes in the ICC library, which allow the execution of arbitrary code via crafted ICC profiles in PostScript files with embedded images.
    last seen2020-06-01
    modified2020-06-02
    plugin id35968
    published2009-03-20
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35968
    titleDebian DSA-1746-1 : ghostscript - several vulnerabilities
  • NASL familySuSE Local Security Checks
    NASL idSUSE9_12375.NASL
    descriptionInteger overflows and missing upper bounds checks in Ghostscript
    last seen2020-06-01
    modified2020-06-02
    plugin id41285
    published2009-09-24
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/41285
    titleSuSE9 Security Update : Ghostscript (YOU Patch Number 12375)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_GHOSTSCRIPT-FONTS-OTHER-6066.NASL
    descriptionInteger overflows and missing upper bounds checks in Ghostscript
    last seen2020-06-01
    modified2020-06-02
    plugin id41512
    published2009-09-24
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/41512
    titleSuSE 10 Security Update : Ghostscript (ZYPP Patch Number 6066)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200903-37.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200903-37 (Ghostscript: User-assisted execution of arbitrary code) Jan Lieskovsky from the Red Hat Security Response Team discovered the following vulnerabilities in Ghostscript
    last seen2020-06-01
    modified2020-06-02
    plugin id36003
    published2009-03-24
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/36003
    titleGLSA-200903-37 : Ghostscript: User-assisted execution of arbitrary code
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2009-095.NASL
    descriptionA buffer underflow in Ghostscript
    last seen2020-06-01
    modified2020-06-02
    plugin id38164
    published2009-04-27
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/38164
    titleMandriva Linux Security Advisory : ghostscript (MDVSA-2009:095)
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL9990.NASL
    descriptionMultiple integer overflow flaws which could lead to heap-based buffer overflows, as well as multiple insufficient input validation flaws, were found in Ghostscript
    last seen2020-06-01
    modified2020-06-02
    plugin id78232
    published2014-10-10
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78232
    titleF5 Networks BIG-IP : icclib vulnerabilities (SOL9990)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2009-3031.NASL
    descriptionMultiple integer overflows were found in the International Color Consortium Format Library (icclib). An attacker could use this flaw to potentially execute arbitrary code by requesting to translate a specially- crafted image file created on one device into another
    last seen2020-06-01
    modified2020-06-02
    plugin id36024
    published2009-03-27
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/36024
    titleFedora 9 : argyllcms-1.0.3-3.fc9 (2009-3031)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2009-2885.NASL
    descriptionSecurity update for integer overflows (CVE-2009-0583) and upper bounds checks (CVE-2009-0584) in the ICC profile handling. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id37905
    published2009-04-23
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/37905
    titleFedora 10 : ghostscript-8.63-5.fc10 (2009-2885)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_GHOSTSCRIPT-DEVEL-6065.NASL
    descriptionInteger overflows and missing upper bounds checks in Ghostscript
    last seen2020-06-01
    modified2020-06-02
    plugin id36004
    published2009-03-24
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/36004
    titleopenSUSE 10 Security Update : ghostscript-devel (ghostscript-devel-6065)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20090319_GHOSTSCRIPT_ON_SL3_X.NASL
    descriptionMultiple integer overflow flaws which could lead to heap-based buffer overflows, as well as multiple insufficient input validation flaws, were found in Ghostscript
    last seen2020-06-01
    modified2020-06-02
    plugin id60549
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60549
    titleScientific Linux Security Update : ghostscript on SL3.x, SL4.x, SL5.x i386/x86_64
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2009-0345.NASL
    descriptionUpdated ghostscript packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ghostscript is a set of software that provides a PostScript(TM) interpreter, a set of C procedures (the Ghostscript library, which implements the graphics capabilities in the PostScript language) and an interpreter for Portable Document Format (PDF) files. Multiple integer overflow flaws which could lead to heap-based buffer overflows, as well as multiple insufficient input validation flaws, were found in Ghostscript
    last seen2020-06-01
    modified2020-06-02
    plugin id35972
    published2009-03-20
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35972
    titleRHEL 3 / 4 / 5 : ghostscript (RHSA-2009:0345)

Oval

accepted2013-04-29T04:06:34.516-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 3
    ovaloval:org.mitre.oval:def:11782
  • commentCentOS Linux 3.x
    ovaloval:org.mitre.oval:def:16651
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 5
    ovaloval:org.mitre.oval:def:11414
  • commentThe operating system installed on the system is CentOS Linux 5.x
    ovaloval:org.mitre.oval:def:15802
  • commentOracle Linux 5.x
    ovaloval:org.mitre.oval:def:15459
descriptionicc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
familyunix
idoval:org.mitre.oval:def:10544
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleicc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
version27

Redhat

advisories
bugzilla
id487744
titleCVE-2009-0584 ghostscript, argyllcms: Multiple insufficient upper-bounds checks on certain sizes in the International Color Consortium Format Library
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 4 is installed
      ovaloval:com.redhat.rhba:tst:20070304025
    • OR
      • AND
        • commentghostscript-gtk is earlier than 0:7.07-33.2.el4_7.5
          ovaloval:com.redhat.rhsa:tst:20090345001
        • commentghostscript-gtk is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20080155006
      • AND
        • commentghostscript is earlier than 0:7.07-33.2.el4_7.5
          ovaloval:com.redhat.rhsa:tst:20090345003
        • commentghostscript is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20080155004
      • AND
        • commentghostscript-devel is earlier than 0:7.07-33.2.el4_7.5
          ovaloval:com.redhat.rhsa:tst:20090345005
        • commentghostscript-devel is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20080155002
  • AND
    • commentRed Hat Enterprise Linux 5 is installed
      ovaloval:com.redhat.rhba:tst:20070331005
    • OR
      • AND
        • commentghostscript-devel is earlier than 0:8.15.2-9.4.el5_3.4
          ovaloval:com.redhat.rhsa:tst:20090345008
        • commentghostscript-devel is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20080155013
      • AND
        • commentghostscript-gtk is earlier than 0:8.15.2-9.4.el5_3.4
          ovaloval:com.redhat.rhsa:tst:20090345010
        • commentghostscript-gtk is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20080155011
      • AND
        • commentghostscript is earlier than 0:8.15.2-9.4.el5_3.4
          ovaloval:com.redhat.rhsa:tst:20090345012
        • commentghostscript is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20080155009
rhsa
idRHSA-2009:0345
released2009-03-19
severityModerate
titleRHSA-2009:0345: ghostscript security update (Moderate)
rpms
  • ghostscript-0:7.05-32.1.17
  • ghostscript-0:7.07-33.2.el4_7.5
  • ghostscript-0:8.15.2-9.4.el5_3.4
  • ghostscript-debuginfo-0:7.05-32.1.17
  • ghostscript-debuginfo-0:7.07-33.2.el4_7.5
  • ghostscript-debuginfo-0:8.15.2-9.4.el5_3.4
  • ghostscript-devel-0:7.05-32.1.17
  • ghostscript-devel-0:7.07-33.2.el4_7.5
  • ghostscript-devel-0:8.15.2-9.4.el5_3.4
  • ghostscript-gtk-0:7.07-33.2.el4_7.5
  • ghostscript-gtk-0:8.15.2-9.4.el5_3.4
  • hpijs-0:1.3-32.1.17

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 34184 CVE(CAN) ID: CVE-2009-0583,CVE-2009-0584 Ghostscript是用于显示PostScript文件或向非PostScript打印机打印这些文件的程序。 Ghostscript的国际色彩联盟格式库(icclib)中存在多个可导致堆溢出的整数溢出,以及多个不充分输入验证错误。攻击者可以使用特制的ICC配置文件创建嵌入了图形的恶意PostScript或PDF文件,如果受害用户打开了该文件就会导致Ghostscript崩溃或执行任意代码。 Ghostscript Ghostscript 8.x Ghostscript Ghostscript 7.x 厂商补丁: RedHat ------ RedHat已经为此发布了一个安全公告(RHSA-2009:0345-01)以及相应补丁: RHSA-2009:0345-01:Moderate: ghostscript security update 链接:<a href=https://www.redhat.com/support/errata/RHSA-2009-0345.html target=_blank rel=external nofollow>https://www.redhat.com/support/errata/RHSA-2009-0345.html</a>
idSSV:4943
last seen2017-11-19
modified2009-03-23
published2009-03-23
reporterRoot
titleGhostscript多个输入验证和整数溢出漏洞

References