In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written.
References
Configurations
History
21 Nov 2024, 07:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2023/04/12/4 - | |
References | () https://bugs.ghostscript.com/show_bug.cgi?id=706494 - Exploit, Vendor Advisory | |
References | () https://ghostscript.readthedocs.io/en/latest/News.html - Release Notes | |
References | () https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=37ed5022cecd584de868933b5b60da2e995b3179 - | |
References | () https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN/ - | |
References | () https://security.gentoo.org/glsa/202309-03 - | |
References | () https://www.debian.org/security/2023/dsa-5383 - Third Party Advisory |
07 Nov 2023, 04:10
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
17 Sep 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-03-31 17:15
Updated : 2024-11-21 07:56
NVD link : CVE-2023-28879
Mitre link : CVE-2023-28879
CVE.ORG link : CVE-2023-28879
JSON object : View
Products Affected
debian
- debian_linux
artifex
- ghostscript
CWE
CWE-787
Out-of-bounds Write