Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
16 Feb 2024, 16:39
Type | Values Removed | Values Added |
---|---|---|
References | (SECUNIA) http://secunia.com/advisories/29101 - URL Repurposed | |
References | (SECTRACK) http://www.securitytracker.com/id?1019511 - Third Party Advisory, VDB Entry | |
References | (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200803-14.xml - Patch | |
References | (VUPEN) http://www.vupen.com/english/advisories/2008/0693/references - Not Applicable | |
References | (SECUNIA) http://secunia.com/advisories/29135 - URL Repurposed | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9557 - Broken Link | |
References | (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00085.html - Release Notes, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00009.html - Mailing List, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/29768 - URL Repurposed | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/488932/100/0/threaded - Broken Link, VDB Entry | |
References | (CONFIRM) http://wiki.rpath.com/Advisories:rPSA-2008-0082 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/29103 - URL Repurposed | |
References | (SECUNIA) http://secunia.com/advisories/29314 - URL Repurposed | |
References | (SECUNIA) http://secunia.com/advisories/29169 - URL Repurposed | |
References | (BID) http://www.securityfocus.com/bid/28017 - Third Party Advisory, VDB Entry | |
References | (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.370633 - Mailing List | |
References | (SECUNIA) http://secunia.com/advisories/29154 - URL Repurposed | |
References | (UBUNTU) http://www.ubuntu.com/usn/usn-599-1 - Third Party Advisory | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/488946/100/0/threaded - Broken Link, VDB Entry | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0155.html - URL Repurposed | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2008:055 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/29112 - URL Repurposed | |
References | (SECUNIA) http://secunia.com/advisories/29196 - URL Repurposed | |
References | (SECUNIA) http://secunia.com/advisories/29147 - URL Repurposed | |
References | (CONFIRM) https://issues.rpath.com/browse/RPL-2217 - Broken Link | |
CPE | cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:x86-64:*:*:*:*:* |
cpe:2.3:o:mandrakesoft:mandrake_linux:2008.0:*:x86_64:*:*:*:*:* cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:x86_64:*:*:*:*:* |
Information
Published : 2008-02-28 21:44
Updated : 2024-02-28 11:01
NVD link : CVE-2008-0411
Mitre link : CVE-2008-0411
CVE.ORG link : CVE-2008-0411
JSON object : View
Products Affected
suse
- open_suse
- suse_linux
- suse_open_enterprise_server
- novell_linux_pos
redhat
- enterprise_linux
- enterprise_linux_desktop
- enterprise_linux_desktop_workstation
- desktop
mandrakesoft
- mandrake_linux
- mandrakesoft_corporate_server
- mandrake_linux_corporate_server
ghostscript
- ghostscript
debian
- debian_linux
rpath
- rpath_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer