Download
| Alert*
oval:org.secpod.oval:def:700138
David Srbecky discovered that Ghostscript incorrectly handled debug logging. If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. This issue only affected Ub ... oval:org.secpod.oval:def:16526 The host is installed with Ghostscript before 8.71 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted postscript (.ps) file. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:300068 A vulnerability has been found and corrected in ghostscript: Stack-based buffer overflow in the parser function in GhostScript 8.70 and 8.64 allows context-dependent attackers to execute arbitrary code via a crafted PostScript file . Packages for 2008.0 and 2009.0 are provided due to the Extended Ma ... oval:org.secpod.oval:def:600133 Several security issues have been discovered in Ghostscript, the GPL PostScript/PDF interpreter, which might lead to the execution of arbitrary code if a user processes a malformed PDF or Postscript file. For the stable distribution , these problems have been fixed in version 8.62.dfsg.1-3.2lenny4. ... oval:org.secpod.oval:def:1000359 The remote host is missing a patch 122259-05 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:1000328 The remote host is missing a patch 122260-05 containing a security fix. For more information please visit the reference link. |