Show filters
148 Total Results
Displaying 131-140 of 148
Sort by:
Attacker Value
Unknown
CVE-2010-2055
Disclosure Date: July 22, 2010 (last updated October 04, 2023)
Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.
0
Attacker Value
Unknown
CVE-2009-4897
Disclosure Date: July 22, 2010 (last updated October 04, 2023)
Buffer overflow in gs/psi/iscan.c in Ghostscript 8.64 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document containing a long name.
0
Attacker Value
Unknown
CVE-2010-1628
Disclosure Date: May 19, 2010 (last updated October 04, 2023)
Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter.
0
Attacker Value
Unknown
CVE-2010-1869
Disclosure Date: May 12, 2010 (last updated October 04, 2023)
Stack-based buffer overflow in the parser function in GhostScript 8.70 and 8.64 allows context-dependent attackers to execute arbitrary code via a crafted PostScript file.
0
Attacker Value
Unknown
CVE-2009-4270
Disclosure Date: December 21, 2009 (last updated October 04, 2023)
Stack-based buffer overflow in the errprintf function in base/gsmisc.c in ghostscript 8.64 through 8.70 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file, as originally reported for debug logging code in gdevcups.c in the CUPS output driver.
0
Attacker Value
Unknown
CVE-2009-0196
Disclosure Date: April 16, 2009 (last updated October 04, 2023)
Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.
0
Attacker Value
Unknown
CVE-2009-0792
Disclosure Date: April 14, 2009 (last updated November 08, 2023)
Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images. NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.
0
Attacker Value
Unknown
CVE-2008-6679
Disclosure Date: April 08, 2009 (last updated October 04, 2023)
Buffer overflow in the BaseFont writer module in Ghostscript 8.62, and possibly other versions, allows remote attackers to cause a denial of service (ps2pdf crash) and possibly execute arbitrary code via a crafted Postscript file.
0
Attacker Value
Unknown
CVE-2007-6725
Disclosure Date: April 08, 2009 (last updated October 04, 2023)
The CCITTFax decoding filter in Ghostscript 8.60, 8.61, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file that triggers a buffer underflow in the cf_decode_2d function.
0
Attacker Value
Unknown
CVE-2009-0583
Disclosure Date: March 23, 2009 (last updated October 04, 2023)
Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
0