Show filters
146 Total Results
Displaying 121-130 of 146
Sort by:
Attacker Value
Unknown
CVE-2017-6196
Disclosure Date: February 24, 2017 (last updated November 08, 2023)
Multiple use-after-free vulnerabilities in the gx_image_enum_begin function in base/gxipixel.c in Ghostscript before ecceafe3abba2714ef9b432035fe0739d9b1a283 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document.
0
Attacker Value
Unknown
CVE-2015-3228
Disclosure Date: August 11, 2015 (last updated October 05, 2023)
Integer overflow in the gs_heap_alloc_bytes function in base/gsmalloc.c in Ghostscript 9.15 and earlier allows remote attackers to cause a denial of service (crash) via a crafted Postscript (ps) file, as demonstrated by using the ps2pdf command, which triggers an out-of-bounds read or write.
0
Attacker Value
Unknown
CVE-2010-4820
Disclosure Date: October 27, 2014 (last updated October 05, 2023)
Untrusted search path vulnerability in Ghostscript 8.62 allows local users to execute arbitrary PostScript code via a Trojan horse Postscript library file in Encoding/ under the current working directory, a different vulnerability than CVE-2010-2055.
0
Attacker Value
Unknown
CVE-2013-6629
Disclosure Date: November 19, 2013 (last updated October 05, 2023)
The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
0
Attacker Value
Unknown
CVE-2012-4405
Disclosure Date: September 18, 2012 (last updated November 08, 2023)
Multiple integer underflows in the icmLut_allocate function in International Color Consortium (ICC) Format library (icclib), as used in Ghostscript 9.06 and Argyll Color Management System, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) PostScript or (2) PDF file with embedded images, which triggers a heap-based buffer overflow. NOTE: this issue is also described as an array index error.
0
Attacker Value
Unknown
CVE-2012-4875
Disclosure Date: September 06, 2012 (last updated November 08, 2023)
Heap-based buffer overflow in gdevwpr2.c in Ghostscript 9.04, when processing the OutputFile device parameter, allows user-assisted remote attackers to execute arbitrary code via a long file name in a PostScript document. NOTE: as of 20120314, the developer was not able to reproduce the issue and disputed it
0
Attacker Value
Unknown
CVE-2010-4054
Disclosure Date: October 23, 2010 (last updated October 04, 2023)
The gs_type2_interpret function in Ghostscript allows remote attackers to cause a denial of service (incorrect pointer dereference and application crash) via crafted font data in a compressed data stream, aka bug 691043.
0
Attacker Value
Unknown
CVE-2009-3743
Disclosure Date: August 26, 2010 (last updated October 04, 2023)
Off-by-one error in the Ins_MINDEX function in the TrueType bytecode interpreter in Ghostscript before 8.71 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a malformed TrueType font in a document that trigger an integer overflow and a heap-based buffer overflow.
0
Attacker Value
Unknown
CVE-2010-2055
Disclosure Date: July 22, 2010 (last updated October 04, 2023)
Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.
0
Attacker Value
Unknown
CVE-2009-4897
Disclosure Date: July 22, 2010 (last updated October 04, 2023)
Buffer overflow in gs/psi/iscan.c in Ghostscript 8.64 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document containing a long name.
0