CVE-2010-2055

Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583183
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583316
http://bugs.ghostscript.com/show_bug.cgi?id=691339 Exploit
http://bugs.ghostscript.com/show_bug.cgi?id=691350
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043913.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043948.html
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://savannah.gnu.org/forum/forum.php?forum_id=6368
http://secunia.com/advisories/40452 Vendor Advisory
http://secunia.com/advisories/40475 Vendor Advisory
http://secunia.com/advisories/40532 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201412-17.xml
http://www.osvdb.org/66247
http://www.securityfocus.com/archive/1/511433
http://www.securityfocus.com/archive/1/511472 Exploit
http://www.securityfocus.com/archive/1/511474 Exploit
http://www.securityfocus.com/archive/1/511476
http://www.vupen.com/english/advisories/2010/1757 Vendor Advisory
https://bugzilla.novell.com/show_bug.cgi?id=608071
https://bugzilla.redhat.com/show_bug.cgi?id=599564 Patch
https://rhn.redhat.com/errata/RHSA-2012-0095.html
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583183
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583316
http://bugs.ghostscript.com/show_bug.cgi?id=691339 Exploit
http://bugs.ghostscript.com/show_bug.cgi?id=691350
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043913.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043948.html
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://savannah.gnu.org/forum/forum.php?forum_id=6368
http://secunia.com/advisories/40452 Vendor Advisory
http://secunia.com/advisories/40475 Vendor Advisory
http://secunia.com/advisories/40532 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201412-17.xml
http://www.osvdb.org/66247
http://www.securityfocus.com/archive/1/511433
http://www.securityfocus.com/archive/1/511472 Exploit
http://www.securityfocus.com/archive/1/511474 Exploit
http://www.securityfocus.com/archive/1/511476
http://www.vupen.com/english/advisories/2010/1757 Vendor Advisory
https://bugzilla.novell.com/show_bug.cgi?id=608071
https://bugzilla.redhat.com/show_bug.cgi?id=599564 Patch
https://rhn.redhat.com/errata/RHSA-2012-0095.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*
cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*
cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*

History

21 Nov 2024, 01:15

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583183 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583183 -
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583316 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583316 -
References () http://bugs.ghostscript.com/show_bug.cgi?id=691339 - Exploit () http://bugs.ghostscript.com/show_bug.cgi?id=691339 - Exploit
References () http://bugs.ghostscript.com/show_bug.cgi?id=691350 - () http://bugs.ghostscript.com/show_bug.cgi?id=691350 -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043913.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043913.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043948.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043948.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html -
References () http://savannah.gnu.org/forum/forum.php?forum_id=6368 - () http://savannah.gnu.org/forum/forum.php?forum_id=6368 -
References () http://secunia.com/advisories/40452 - Vendor Advisory () http://secunia.com/advisories/40452 - Vendor Advisory
References () http://secunia.com/advisories/40475 - Vendor Advisory () http://secunia.com/advisories/40475 - Vendor Advisory
References () http://secunia.com/advisories/40532 - Vendor Advisory () http://secunia.com/advisories/40532 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-201412-17.xml - () http://security.gentoo.org/glsa/glsa-201412-17.xml -
References () http://www.osvdb.org/66247 - () http://www.osvdb.org/66247 -
References () http://www.securityfocus.com/archive/1/511433 - () http://www.securityfocus.com/archive/1/511433 -
References () http://www.securityfocus.com/archive/1/511472 - Exploit () http://www.securityfocus.com/archive/1/511472 - Exploit
References () http://www.securityfocus.com/archive/1/511474 - Exploit () http://www.securityfocus.com/archive/1/511474 - Exploit
References () http://www.securityfocus.com/archive/1/511476 - () http://www.securityfocus.com/archive/1/511476 -
References () http://www.vupen.com/english/advisories/2010/1757 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1757 - Vendor Advisory
References () https://bugzilla.novell.com/show_bug.cgi?id=608071 - () https://bugzilla.novell.com/show_bug.cgi?id=608071 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=599564 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=599564 - Patch
References () https://rhn.redhat.com/errata/RHSA-2012-0095.html - () https://rhn.redhat.com/errata/RHSA-2012-0095.html -

Information

Published : 2010-07-22 05:43

Updated : 2024-11-21 01:15


NVD link : CVE-2010-2055

Mitre link : CVE-2010-2055

CVE.ORG link : CVE-2010-2055


JSON object : View

Products Affected

artifex

  • ghostscript_fonts
  • afpl_ghostscript
  • gpl_ghostscript
CWE
CWE-17

DEPRECATED: Code