CVE-2010-1628
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
19/05/2010
Last modified:
10/10/2018
Description
Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:* | ||
cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.ghostscript.com/show_bug.cgi?id=691295
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://seclists.org/fulldisclosure/2010/May/134
- http://secunia.com/advisories/39753
- http://secunia.com/advisories/40580
- http://security.gentoo.org/glsa/glsa-201412-17.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A134
- http://www.openwall.com/lists/oss-security/2010/05/12/1
- http://www.openwall.com/lists/oss-security/2010/05/18/7
- http://www.securityfocus.com/archive/1/511243/100/0/threaded
- http://www.securityfocus.com/bid/40107
- http://www.ubuntu.com/usn/USN-961-1
- http://www.vupen.com/english/advisories/2010/1138
- https://bugs.launchpad.net/ubuntu/+source/ghostscript/+bug/546009