CVE-2009-3743 – ghostscript: TrueType bytecode intepreter integer overflow or wraparound
https://notcve.org/view.php?id=CVE-2009-3743
Off-by-one error in the Ins_MINDEX function in the TrueType bytecode interpreter in Ghostscript before 8.71 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a malformed TrueType font in a document that trigger an integer overflow and a heap-based buffer overflow. Un error por un paso en la función Ins_MINDEX en el intérprete de código de bytes TrueType en Ghostscript anterior a versión 8.71, permite a los atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria de la pila) por medio de una fuente TrueType malformada en un documento que desencadena un desbordamiento de enteros y un desbordamiento de búfer en la región heap de la memoria. • http://security.gentoo.org/glsa/glsa-201412-17.xml http://www.kb.cert.org/vuls/id/644319 http://www.kb.cert.org/vuls/id/JALR-87YGN8 http://www.securityfocus.com/archive/1/514892/100/0/threaded http://www.securitytracker.com/id?1024785 https://rhn.redhat.com/errata/RHSA-2012-0095.html https://access.redhat.com/security/cve/CVE-2009-3743 https://bugzilla.redhat.com/show_bug.cgi?id=627902 • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound •
CVE-2010-2055 – ghostscript: gs_init.ps searched in current directory despite -P-
https://notcve.org/view.php?id=CVE-2010-2055
Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820. Ghostscript v8.71 y versiones anteriores, lee los ficheros de inicialización desde el directorio de trabajo actual, lo que permite a usuarios locales ejecutar comandos PostScript de su elección a través de un archivo "Trojan horse" (Caballo de Troya"), relacionado con el soporte inapropiado para la opción -P del programa. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583183 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583316 http://bugs.ghostscript.com/show_bug.cgi?id=691339 http://bugs.ghostscript.com/show_bug.cgi?id=691350 http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043913.html http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043948.html http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html http://savannah.gnu.org/forum/forum.php? • CWE-17: DEPRECATED: Code •
CVE-2009-4897
https://notcve.org/view.php?id=CVE-2009-4897
Buffer overflow in gs/psi/iscan.c in Ghostscript 8.64 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document containing a long name. Desbordamiento de búfer en gs/psi/iscan.c en Ghostscript v8.64 y anteriores permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un documento PDF manipulado el cual contiene un nombre largo. • http://bugs.ghostscript.com/show_bug.cgi?id=690523 http://secunia.com/advisories/40580 http://security.gentoo.org/glsa/glsa-201412-17.xml http://www.mandriva.com/security/advisories?name=MDVSA-2010:134 http://www.mandriva.com/security/advisories?name=MDVSA-2010:135 http://www.osvdb.org/66277 http://www.securityfocus.com/bid/41593 http://www.ubuntu.com/usn/USN-961-1 https://bugzilla.redhat.com/show_bug.cgi?id=613792 https://exchange.xforce.ibmcloud.com/vulnerabilities/603 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2010-1628
https://notcve.org/view.php?id=CVE-2010-1628
Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter. Ghostscript v8.64, v8.70 y puede que también otras versiones, permite a atacantes dependientes del contexto ejecutar código de su elección mediante un fichero PostScript que contenga invocaciones ilimitadas y recursivas a procedimientos, esto provoca una corrupción de memoria en la pila del intérprete. • http://bugs.ghostscript.com/show_bug.cgi?id=691295 http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html http://seclists.org/fulldisclosure/2010/May/134 http://secunia.com/advisories/39753 http://secunia.com/advisories/40580 http://security.gentoo.org/glsa/glsa-201412-17.xml http://www.mandriva.com/security/advisories?name=MDVSA-2010:134 http://www.openwall.com/lists/oss-security/2010/05/12/1 http://www.openwall.com/lists/oss-security/2010/05/18/7 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2010-1869 – Ghostscript - '.PostScript' File Stack Overflow
https://notcve.org/view.php?id=CVE-2010-1869
Stack-based buffer overflow in the parser function in GhostScript 8.70 and 8.64 allows context-dependent attackers to execute arbitrary code via a crafted PostScript file. Desbordamiento de búffer basado en el parseo de la función de GhostScript v8.70 y v8.64 permite a atacantes dependiendo del contexto ejecutar código de su elección a través de la manipulación del fichero PostScript. • https://www.exploit-db.com/exploits/14406 http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html http://secunia.com/advisories/39753 http://secunia.com/advisories/40580 http://www.checkpoint.com/defense/advisories/public/2010/cpai-10-May.html http://www.mandriva.com/security/advisories?name=MDVSA-2010:102 http://www.securityfocus.com/archive/1/511243/100/0/threaded http://www.securityfocus.com/bid/40103 http://www.securitytracker.com/id?1024003 http://www. • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •