CVE-2010-1628
Gentoo Linux Security Advisory 201412-17
Severity Score
9.8
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
5
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter.
Ghostscript v8.64, v8.70 y puede que también otras versiones, permite a atacantes dependientes del contexto ejecutar código de su elección mediante un fichero PostScript que contenga invocaciones ilimitadas y recursivas a procedimientos, esto provoca una corrupción de memoria en la pila del intérprete.
Multiple vulnerabilities have been found in GPL Ghostscript, the worst of which may allow execution of arbitrary code. Versions prior to 9.10-r2 are affected.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2010-04-29 CVE Reserved
- 2010-05-19 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://bugs.ghostscript.com/show_bug.cgi?id=691295 | X_refsource_misc | |
http://www.securityfocus.com/archive/1/511243/100/0/threaded | Mailing List |
URL | Date | SRC |
---|---|---|
http://seclists.org/fulldisclosure/2010/May/134 | 2024-08-07 | |
http://www.openwall.com/lists/oss-security/2010/05/12/1 | 2024-08-07 | |
http://www.openwall.com/lists/oss-security/2010/05/18/7 | 2024-08-07 | |
http://www.securityfocus.com/bid/40107 | 2024-08-07 | |
https://bugs.launchpad.net/ubuntu/+source/ghostscript/+bug/546009 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html | 2018-10-10 | |
http://secunia.com/advisories/39753 | 2018-10-10 | |
http://secunia.com/advisories/40580 | 2018-10-10 | |
http://security.gentoo.org/glsa/glsa-201412-17.xml | 2018-10-10 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2010:134 | 2018-10-10 | |
http://www.ubuntu.com/usn/USN-961-1 | 2018-10-10 | |
http://www.vupen.com/english/advisories/2010/1138 | 2018-10-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Artifex Search vendor "Artifex" | Gpl Ghostscript Search vendor "Artifex" for product "Gpl Ghostscript" | 8.64 Search vendor "Artifex" for product "Gpl Ghostscript" and version "8.64" | - |
Affected
| ||||||
Artifex Search vendor "Artifex" | Gpl Ghostscript Search vendor "Artifex" for product "Gpl Ghostscript" | 8.70 Search vendor "Artifex" for product "Gpl Ghostscript" and version "8.70" | - |
Affected
|