Heap-based buffer overflow in gdevwpr2.c in Ghostscript 9.04, when processing the OutputFile device parameter, allows user-assisted remote attackers to execute arbitrary code via a long file name in a PostScript document. NOTE: as of 20120314, the developer was not able to reproduce the issue and disputed it
References
Configurations
History
07 Nov 2023, 02:12
Type | Values Removed | Values Added |
---|---|---|
Summary | Heap-based buffer overflow in gdevwpr2.c in Ghostscript 9.04, when processing the OutputFile device parameter, allows user-assisted remote attackers to execute arbitrary code via a long file name in a PostScript document. NOTE: as of 20120314, the developer was not able to reproduce the issue and disputed it |
Information
Published : 2012-09-06 21:55
Updated : 2024-08-06 21:15
NVD link : CVE-2012-4875
Mitre link : CVE-2012-4875
CVE.ORG link : CVE-2012-4875
JSON object : View
Products Affected
artifex
- gpl_ghostscript
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer