[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:700138
David Srbecky discovered that Ghostscript incorrectly handled debug logging. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. This issue only affected Ub ...

oval:org.secpod.oval:def:16526
The host is installed with Ghostscript before 8.71 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted postscript (.ps) file. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:300068
A vulnerability has been found and corrected in ghostscript: Stack-based buffer overflow in the parser function in GhostScript 8.70 and 8.64 allows context-dependent attackers to execute arbitrary code via a crafted PostScript file . Packages for 2008.0 and 2009.0 are provided due to the Extended Ma ...

oval:org.secpod.oval:def:600133
Several security issues have been discovered in Ghostscript, the GPL PostScript/PDF interpreter, which might lead to the execution of arbitrary code if a user processes a malformed PDF or Postscript file. For the stable distribution , these problems have been fixed in version 8.62.dfsg.1-3.2lenny4. ...

oval:org.secpod.oval:def:1000359
The remote host is missing a patch 122259-05 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000328
The remote host is missing a patch 122260-05 containing a security fix. For more information please visit the reference link.

CPE    2
cpe:/a:artifex:gpl_ghostscript:8.70
cpe:/a:artifex:gpl_ghostscript:8.64
CWE    1
CWE-119
*CVE
CVE-2010-1869

© SecPod Technologies