CVE-2010-4820
ghostscript: CWD included in the default library search path
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Untrusted search path vulnerability in Ghostscript 8.62 allows local users to execute arbitrary PostScript code via a Trojan horse Postscript library file in Encoding/ under the current working directory, a different vulnerability than CVE-2010-2055.
Vulnerabilidad no especificada en Ghostscript 8.62 permite a atacantes remotos ejecutar código PostScript arbitrario a través de un fichero troyano de la librería Postscript en Encoding/ bajo el directorio de trabajo actual, una vulnerabilidad diferente a CVE-2010-2055.
Ghostscript is a set of software that provides a PostScript interpreter, a set of C procedures and an interpreter for Portable Document Format files. An integer overflow flaw was found in Ghostscript's TrueType bytecode interpreter. An attacker could create a specially-crafted PostScript or PDF file that, when interpreted, could cause Ghostscript to crash or, potentially, execute arbitrary code. It was found that Ghostscript always tried to read Ghostscript system initialization files from the current working directory before checking other directories, even if a search path that did not contain the current working directory was specified with the "-I" option, or the "-P-" option was used. If a user ran Ghostscript in an attacker-controlled directory containing a system initialization file, it could cause Ghostscript to execute arbitrary PostScript code.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-08-19 CVE Reserved
- 2012-02-03 CVE Published
- 2024-08-07 CVE Updated
- 2025-04-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://bugs.ghostscript.com/show_bug.cgi?id=691339 | X_refsource_misc | |
http://www.openwall.com/lists/oss-security/2012/01/04/7 | Mailing List |
|
http://www.securityfocus.com/archive/1/511433 | Mailing List | |
http://www.securityfocus.com/bid/51847 | Vdb Entry | |
https://bugzilla.redhat.com/show_bug.cgi?id=599564 | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2012-0095.html | 2014-11-02 | |
http://rhn.redhat.com/errata/RHSA-2012-0096.html | 2014-11-02 | |
https://bugzilla.redhat.com/show_bug.cgi?id=771853 | 2012-02-02 | |
https://access.redhat.com/security/cve/CVE-2010-4820 | 2012-02-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ghostscript Search vendor "Ghostscript" | Ghostscript Search vendor "Ghostscript" for product "Ghostscript" | 8.62 Search vendor "Ghostscript" for product "Ghostscript" and version "8.62" | - |
Affected
|