CVE-2009-0792

Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images. NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
http://secunia.com/advisories/34373 Vendor Advisory
http://secunia.com/advisories/34667
http://secunia.com/advisories/34711 Vendor Advisory
http://secunia.com/advisories/34726
http://secunia.com/advisories/34729
http://secunia.com/advisories/34732
http://secunia.com/advisories/35416
http://secunia.com/advisories/35559
http://secunia.com/advisories/35569
http://security.gentoo.org/glsa/glsa-201412-17.xml
http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1
http://support.avaya.com/elmodocs2/security/ASA-2009-155.htm
http://wiki.rpath.com/Advisories:rPSA-2009-0060
http://www.mandriva.com/security/advisories?name=MDVSA-2009:095
http://www.mandriva.com/security/advisories?name=MDVSA-2009:096
http://www.redhat.com/support/errata/RHSA-2009-0420.html
http://www.redhat.com/support/errata/RHSA-2009-0421.html
http://www.securityfocus.com/archive/1/502757/100/0/threaded
http://www.vupen.com/english/advisories/2009/1708
https://bugzilla.redhat.com/show_bug.cgi?id=491853
https://exchange.xforce.ibmcloud.com/vulnerabilities/50381
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11207
https://usn.ubuntu.com/757-1/
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00211.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00217.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00460.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00461.html
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
http://secunia.com/advisories/34373 Vendor Advisory
http://secunia.com/advisories/34667
http://secunia.com/advisories/34711 Vendor Advisory
http://secunia.com/advisories/34726
http://secunia.com/advisories/34729
http://secunia.com/advisories/34732
http://secunia.com/advisories/35416
http://secunia.com/advisories/35559
http://secunia.com/advisories/35569
http://security.gentoo.org/glsa/glsa-201412-17.xml
http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1
http://support.avaya.com/elmodocs2/security/ASA-2009-155.htm
http://wiki.rpath.com/Advisories:rPSA-2009-0060
http://www.mandriva.com/security/advisories?name=MDVSA-2009:095
http://www.mandriva.com/security/advisories?name=MDVSA-2009:096
http://www.redhat.com/support/errata/RHSA-2009-0420.html
http://www.redhat.com/support/errata/RHSA-2009-0421.html
http://www.securityfocus.com/archive/1/502757/100/0/threaded
http://www.vupen.com/english/advisories/2009/1708
https://bugzilla.redhat.com/show_bug.cgi?id=491853
https://exchange.xforce.ibmcloud.com/vulnerabilities/50381
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11207
https://usn.ubuntu.com/757-1/
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00211.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00217.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00460.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00461.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:5.50:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:7.05:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:7.07:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.15.2:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.54:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.56:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.57:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.61:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.62:*:*:*:*:*:*:*
cpe:2.3:a:ghostscript:ghostscript:8.63:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:argyllcms:argyllcms:*:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:0.7.0:beta_8:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:argyllcms:argyllcms:1.0.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:00

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html - () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html -
References () http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html - () http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html -
References () http://secunia.com/advisories/34373 - Vendor Advisory () http://secunia.com/advisories/34373 - Vendor Advisory
References () http://secunia.com/advisories/34667 - () http://secunia.com/advisories/34667 -
References () http://secunia.com/advisories/34711 - Vendor Advisory () http://secunia.com/advisories/34711 - Vendor Advisory
References () http://secunia.com/advisories/34726 - () http://secunia.com/advisories/34726 -
References () http://secunia.com/advisories/34729 - () http://secunia.com/advisories/34729 -
References () http://secunia.com/advisories/34732 - () http://secunia.com/advisories/34732 -
References () http://secunia.com/advisories/35416 - () http://secunia.com/advisories/35416 -
References () http://secunia.com/advisories/35559 - () http://secunia.com/advisories/35559 -
References () http://secunia.com/advisories/35569 - () http://secunia.com/advisories/35569 -
References () http://security.gentoo.org/glsa/glsa-201412-17.xml - () http://security.gentoo.org/glsa/glsa-201412-17.xml -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1 -
References () http://support.avaya.com/elmodocs2/security/ASA-2009-155.htm - () http://support.avaya.com/elmodocs2/security/ASA-2009-155.htm -
References () http://wiki.rpath.com/Advisories:rPSA-2009-0060 - () http://wiki.rpath.com/Advisories:rPSA-2009-0060 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:095 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:095 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:096 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:096 -
References () http://www.redhat.com/support/errata/RHSA-2009-0420.html - () http://www.redhat.com/support/errata/RHSA-2009-0420.html -
References () http://www.redhat.com/support/errata/RHSA-2009-0421.html - () http://www.redhat.com/support/errata/RHSA-2009-0421.html -
References () http://www.securityfocus.com/archive/1/502757/100/0/threaded - () http://www.securityfocus.com/archive/1/502757/100/0/threaded -
References () http://www.vupen.com/english/advisories/2009/1708 - () http://www.vupen.com/english/advisories/2009/1708 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=491853 - () https://bugzilla.redhat.com/show_bug.cgi?id=491853 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/50381 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/50381 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11207 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11207 -
References () https://usn.ubuntu.com/757-1/ - () https://usn.ubuntu.com/757-1/ -
References () https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00211.html - () https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00211.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00217.html - () https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00217.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00460.html - () https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00460.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00461.html - () https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00461.html -

07 Nov 2023, 02:03

Type Values Removed Values Added
Summary Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images. NOTE: this issue exists because of an incomplete fix for CVE-2009-0583. Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images. NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.

Information

Published : 2009-04-14 16:26

Updated : 2024-11-21 01:00


NVD link : CVE-2009-0792

Mitre link : CVE-2009-0792

CVE.ORG link : CVE-2009-0792


JSON object : View

Products Affected

argyllcms

  • argyllcms

ghostscript

  • ghostscript
CWE
CWE-189

Numeric Errors