vendor:
Ghostscript
by:
N/A
7.5
CVSS
HIGH
Buffer-Overflow
120
CWE
Product Name: Ghostscript
Affected Version From: Ghostscript 8.63 and earlier
Affected Version To: Ghostscript 8.64
Patch Exists: YES
Related CWE: CVE-2009-0458
CPE: N/A
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=75629, https://www.infosecmatter.com/nessus-plugin-library/?id=76303, https://www.infosecmatter.com/nessus-plugin-library/?id=63402, https://www.infosecmatter.com/nessus-plugin-library/?id=50046, https://www.infosecmatter.com/nessus-plugin-library/?id=47037, https://www.infosecmatter.com/nessus-plugin-library/?id=47038
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu, Sun Solaris
2009
Ghostscript Remote Buffer-Overflow Vulnerability
Ghostscript is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it into a finite-sized buffer. Exploiting this issue allows remote attackers to overwrite a sensitive memory buffer with arbitrary data, potentially allowing them to execute malicious machine code in the context of the affected application.
Mitigation:
Upgrade to the latest version of Ghostscript 8.64 or later.