[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2016-7977Date: (C)2017-05-24   (M)2023-12-22


Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.5CVSS Score : 4.3
Exploit Score: 1.8Exploit Score: 8.6
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: REQUIREDConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
BID-95334
DSA-3691
GLSA-201702-31
RHSA-2017:0013
RHSA-2017:0014
http://www.openwall.com/lists/oss-security/2016/09/29/28
http://www.openwall.com/lists/oss-security/2016/10/05/15
http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=8abd22010eb4db0fb1b10e430d5f5d83e015ef70
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
https://bugs.ghostscript.com/show_bug.cgi?id=697169
https://ghostscript.com/doc/9.21/History9.htm

CWE    1
CWE-200
OVAL    17
oval:org.secpod.oval:def:89045353
oval:org.secpod.oval:def:40650
oval:org.secpod.oval:def:204068
oval:org.secpod.oval:def:2102600
...

© SecPod Technologies