6 results (0.002 seconds)

CVSS: 7.2EPSS: 0%CPEs: 20EXPL: 0

The (1) pj-gs.sh, (2) ps2epsi, (3) pv.sh, and (4) sysvlp.sh scripts in the ESP Ghostscript (espgs) package in Trustix Secure Linux 1.5 through 2.1, and other operating systems, allow local users to overwrite files via a symlink attack on temporary files. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.19/SCOSA-2006.19.txt ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.23/SCOSA-2006.23.txt http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136321 http://secunia.com/advisories/16997 http://secunia.com/advisories/17135 http://secunia.com/advisories/19799 http://secunia.com/advisories/20056 http://www.redhat.com/support/errata/RHSA-2005-081.html http://www.securityfocus.com/bid/11285 http://www.trustix.org&#x • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

ghostscript before 6.53 allows attackers to execute arbitrary commands by using .locksafe or .setsafe to reset the current pagedevice. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-026.0.txt http://www.ghostscript.com/pipermail/gs-code-review/2002-February/001900.html http://www.ghostscript.com/pipermail/gs-code-review/2002-January/001801.html http://www.iss.net/security_center/static/9254.php http://www.redhat.com/support/errata/RHSA-2002-083.html http://www.redhat.com/support/errata/RHSA-2002-123.html http://www.redhat.com/support/errata/RHSA-2003-209.html http://www.securityfocus.com/bid/49 •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 0

ghostscript before 6.51 allows local users to read and write arbitrary files as the 'lp' user via the file operator, even with -dSAFER enabled. • http://archives.neohapsis.com/archives/hp/2001-q4/0069.html http://marc.info/?l=lprng&m=100083210910857&w=2 http://rhn.redhat.com/errata/RHSA-2001-112.html http://www.redhat.com/support/errata/RHSA-2001-138.html •

CVSS: 3.7EPSS: 0%CPEs: 4EXPL: 0

ghostscript before 5.10-16 allows local users to overwrite files of other users via a symlink attack. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000343 http://www.calderasystems.com/support/security/advisories/CSSA-2000-041.0.txt http://www.debian.org/security/2000/20001123 http://www.linux-mandrake.com/en/security/MDKSA-2000-074.php3 http://www.redhat.com/support/errata/RHSA-2000-114.html http://www.securityfocus.com/bid/1990 https://exchange.xforce.ibmcloud.com/vulnerabilities/5563 •

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 0

ghostscript before 5.10-16 uses an empty LD_RUN_PATH environmental variable to find libraries in the current directory, which could allow local users to execute commands as other users by placing a Trojan horse library into a directory from which another user executes ghostscript. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000343 http://www.calderasystems.com/support/security/advisories/CSSA-2000-041.0.txt http://www.debian.org/security/2000/20001123 http://www.linux-mandrake.com/en/security/MDKSA-2000-074.php3 http://www.securityfocus.com/bid/1991 https://exchange.xforce.ibmcloud.com/vulnerabilities/5564 •