CVE-2004-0967

The (1) pj-gs.sh, (2) ps2epsi, (3) pv.sh, and (4) sysvlp.sh scripts in the ESP Ghostscript (espgs) package in Trustix Secure Linux 1.5 through 2.1, and other operating systems, allow local users to overwrite files via a symlink attack on temporary files.
References
Link Resource
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.19/SCOSA-2006.19.txt
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.23/SCOSA-2006.23.txt
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136321
http://secunia.com/advisories/16997 Vendor Advisory
http://secunia.com/advisories/17135 Vendor Advisory
http://secunia.com/advisories/19799 Vendor Advisory
http://secunia.com/advisories/20056 Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-081.html
http://www.securityfocus.com/bid/11285 Patch Vendor Advisory
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10284
https://www.ubuntu.com/usn/usn-3-1/
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.19/SCOSA-2006.19.txt
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.23/SCOSA-2006.23.txt
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136321
http://secunia.com/advisories/16997 Vendor Advisory
http://secunia.com/advisories/17135 Vendor Advisory
http://secunia.com/advisories/19799 Vendor Advisory
http://secunia.com/advisories/20056 Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-081.html
http://www.securityfocus.com/bid/11285 Patch Vendor Advisory
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10284
https://www.ubuntu.com/usn/usn-3-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:aladdin_enterprises:ghostscript:4.3:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:5.10.10:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:5.10.10:*:mdk:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:5.10.10_1:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:5.10.10_1:*:mdk:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:5.10.12cl:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:5.10.15:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:5.10.16:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:5.10cl:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:5.50:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:5.50.8:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:5.50.8_7:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:6.51:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:6.52:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:6.53:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:aladdin_enterprises:ghostscript:7.0.7:*:*:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.19/SCOSA-2006.19.txt - () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.19/SCOSA-2006.19.txt -
References () ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.23/SCOSA-2006.23.txt - () ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.23/SCOSA-2006.23.txt -
References () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136321 - () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136321 -
References () http://secunia.com/advisories/16997 - Vendor Advisory () http://secunia.com/advisories/16997 - Vendor Advisory
References () http://secunia.com/advisories/17135 - Vendor Advisory () http://secunia.com/advisories/17135 - Vendor Advisory
References () http://secunia.com/advisories/19799 - Vendor Advisory () http://secunia.com/advisories/19799 - Vendor Advisory
References () http://secunia.com/advisories/20056 - Vendor Advisory () http://secunia.com/advisories/20056 - Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-081.html - () http://www.redhat.com/support/errata/RHSA-2005-081.html -
References () http://www.securityfocus.com/bid/11285 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/11285 - Patch, Vendor Advisory
References () http://www.trustix.org/errata/2004/0050 - () http://www.trustix.org/errata/2004/0050 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10284 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10284 -
References () https://www.ubuntu.com/usn/usn-3-1/ - () https://www.ubuntu.com/usn/usn-3-1/ -

Information

Published : 2005-02-09 05:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-0967

Mitre link : CVE-2004-0967

CVE.ORG link : CVE-2004-0967


JSON object : View

Products Affected

aladdin_enterprises

  • ghostscript
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')