// For flags

CVE-2009-0583

argyllcms: Multiple integer overflows in the International Color Consortium Format Library

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.

Múltiples desbordamientos de enteros en icc.c en la libreria de formatos (alias icclib) del International Color Consortium (ICC), tal como se utiliza en Ghostscript 8.64 y anteriores y Argyll Color Management System (CMS) 1.0.3 y anteriores, permiten causar una denegación de servicio (con desbordamiento de búfer basado en pila y caída de la aplicación) a atacantes dependientes de contexto y posiblemente ejecutar código arbitrario por medio de un fichero de dispositivo para una solicitud de traducción que opera en un archivo de imagen creado y se dirige a un determinado "espacio de color nativo", en relación con un perfil ICC en un (1) PostScript o (2) archivo PDF con imágenes incrustadas.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-02-13 CVE Reserved
  • 2009-03-23 CVE Published
  • 2023-05-11 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  • CWE-190: Integer Overflow or Wraparound
CAPEC
References (41)
URL Date SRC
URL Date SRC
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html 2023-02-13
http://secunia.com/advisories/34266 2023-02-13
http://secunia.com/advisories/34373 2023-02-13
http://secunia.com/advisories/34381 2023-02-13
http://secunia.com/advisories/34393 2023-02-13
http://secunia.com/advisories/34398 2023-02-13
http://secunia.com/advisories/34418 2023-02-13
http://secunia.com/advisories/34437 2023-02-13
http://secunia.com/advisories/34443 2023-02-13
http://secunia.com/advisories/34469 2023-02-13
http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1 2023-02-13
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0050 2023-02-13
http://www.debian.org/security/2009/dsa-1746 2023-02-13
http://www.gentoo.org/security/en/glsa/glsa-200903-37.xml 2023-02-13
http://www.mandriva.com/security/advisories?name=MDVSA-2009:095 2023-02-13
http://www.mandriva.com/security/advisories?name=MDVSA-2009:096 2023-02-13
http://www.redhat.com/support/errata/RHSA-2009-0345.html 2023-02-13
http://www.ubuntu.com/usn/USN-743-1 2023-02-13
http://www.vupen.com/english/advisories/2009/0776 2023-02-13
http://www.vupen.com/english/advisories/2009/0777 2023-02-13
http://www.vupen.com/english/advisories/2009/0816 2023-02-13
https://bugzilla.redhat.com/show_bug.cgi?id=487742 2009-03-19
https://usn.ubuntu.com/757-1 2023-02-13
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00770.html 2023-02-13
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00772.html 2023-02-13
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00887.html 2023-02-13
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00916.html 2023-02-13
https://access.redhat.com/security/cve/CVE-2009-0583 2009-03-19
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ghostscript
Search vendor "Ghostscript"
Ghostscript
Search vendor "Ghostscript" for product "Ghostscript"
<= 8.64
Search vendor "Ghostscript" for product "Ghostscript" and version " <= 8.64"
-
Affected
Ghostscript
Search vendor "Ghostscript"
Ghostscript
Search vendor "Ghostscript" for product "Ghostscript"
5.50
Search vendor "Ghostscript" for product "Ghostscript" and version "5.50"
-
Affected
Ghostscript
Search vendor "Ghostscript"
Ghostscript
Search vendor "Ghostscript" for product "Ghostscript"
7.05
Search vendor "Ghostscript" for product "Ghostscript" and version "7.05"
-
Affected
Ghostscript
Search vendor "Ghostscript"
Ghostscript
Search vendor "Ghostscript" for product "Ghostscript"
7.07
Search vendor "Ghostscript" for product "Ghostscript" and version "7.07"
-
Affected
Ghostscript
Search vendor "Ghostscript"
Ghostscript
Search vendor "Ghostscript" for product "Ghostscript"
8.0.1
Search vendor "Ghostscript" for product "Ghostscript" and version "8.0.1"
-
Affected
Ghostscript
Search vendor "Ghostscript"
Ghostscript
Search vendor "Ghostscript" for product "Ghostscript"
8.15
Search vendor "Ghostscript" for product "Ghostscript" and version "8.15"
-
Affected
Ghostscript
Search vendor "Ghostscript"
Ghostscript
Search vendor "Ghostscript" for product "Ghostscript"
8.15.2
Search vendor "Ghostscript" for product "Ghostscript" and version "8.15.2"
-
Affected
Ghostscript
Search vendor "Ghostscript"
Ghostscript
Search vendor "Ghostscript" for product "Ghostscript"
8.54
Search vendor "Ghostscript" for product "Ghostscript" and version "8.54"
-
Affected
Ghostscript
Search vendor "Ghostscript"
Ghostscript
Search vendor "Ghostscript" for product "Ghostscript"
8.56
Search vendor "Ghostscript" for product "Ghostscript" and version "8.56"
-
Affected
Ghostscript
Search vendor "Ghostscript"
Ghostscript
Search vendor "Ghostscript" for product "Ghostscript"
8.57
Search vendor "Ghostscript" for product "Ghostscript" and version "8.57"
-
Affected
Ghostscript
Search vendor "Ghostscript"
Ghostscript
Search vendor "Ghostscript" for product "Ghostscript"
8.61
Search vendor "Ghostscript" for product "Ghostscript" and version "8.61"
-
Affected
Ghostscript
Search vendor "Ghostscript"
Ghostscript
Search vendor "Ghostscript" for product "Ghostscript"
8.62
Search vendor "Ghostscript" for product "Ghostscript" and version "8.62"
-
Affected
Ghostscript
Search vendor "Ghostscript"
Ghostscript
Search vendor "Ghostscript" for product "Ghostscript"
8.63
Search vendor "Ghostscript" for product "Ghostscript" and version "8.63"
-
Affected
Argyllcms
Search vendor "Argyllcms"
Argyllcms
Search vendor "Argyllcms" for product "Argyllcms"
<= 1.0.3
Search vendor "Argyllcms" for product "Argyllcms" and version " <= 1.0.3"
-
Affected
Argyllcms
Search vendor "Argyllcms"
Argyllcms
Search vendor "Argyllcms" for product "Argyllcms"
0.1.0
Search vendor "Argyllcms" for product "Argyllcms" and version "0.1.0"
-
Affected
Argyllcms
Search vendor "Argyllcms"
Argyllcms
Search vendor "Argyllcms" for product "Argyllcms"
0.2.0
Search vendor "Argyllcms" for product "Argyllcms" and version "0.2.0"
-
Affected
Argyllcms
Search vendor "Argyllcms"
Argyllcms
Search vendor "Argyllcms" for product "Argyllcms"
0.2.1
Search vendor "Argyllcms" for product "Argyllcms" and version "0.2.1"
-
Affected
Argyllcms
Search vendor "Argyllcms"
Argyllcms
Search vendor "Argyllcms" for product "Argyllcms"
0.2.2
Search vendor "Argyllcms" for product "Argyllcms" and version "0.2.2"
-
Affected
Argyllcms
Search vendor "Argyllcms"
Argyllcms
Search vendor "Argyllcms" for product "Argyllcms"
0.3.0
Search vendor "Argyllcms" for product "Argyllcms" and version "0.3.0"
-
Affected
Argyllcms
Search vendor "Argyllcms"
Argyllcms
Search vendor "Argyllcms" for product "Argyllcms"
0.6.0
Search vendor "Argyllcms" for product "Argyllcms" and version "0.6.0"
-
Affected
Argyllcms
Search vendor "Argyllcms"
Argyllcms
Search vendor "Argyllcms" for product "Argyllcms"
0.7.0
Search vendor "Argyllcms" for product "Argyllcms" and version "0.7.0"
beta_8
Affected
Argyllcms
Search vendor "Argyllcms"
Argyllcms
Search vendor "Argyllcms" for product "Argyllcms"
1.0.0
Search vendor "Argyllcms" for product "Argyllcms" and version "1.0.0"
-
Affected
Argyllcms
Search vendor "Argyllcms"
Argyllcms
Search vendor "Argyllcms" for product "Argyllcms"
1.0.2
Search vendor "Argyllcms" for product "Argyllcms" and version "1.0.2"
-
Affected