First published: Mon Feb 19 2007(Updated: )
A denial of service flaw was found in Ghostscript's CCITTFax decoding filter. An attacker could create a specially-crafted PDF file which could cause Ghostscript to crash, or, potentially execute arbitrary code, when opened by the victim.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ghostscript | <0:7.07-33.2.el4_7.8 | 0:7.07-33.2.el4_7.8 |
redhat/ghostscript | <0:8.15.2-9.4.el5_3.7 | 0:8.15.2-9.4.el5_3.7 |
Artifex Ghostscript | =8.60 | |
Artifex Ghostscript | =8.61 | |
Artifex Ghostscript | =8.60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6725 is classified as a denial of service vulnerability that could also lead to potential arbitrary code execution.
To mitigate CVE-2007-6725, users should update Ghostscript to a version that is not affected, specifically versions after 8.61.
CVE-2007-6725 affects Ghostscript versions 8.60 and 8.61 among others listed in the advisory.
Opening a malicious PDF file may cause Ghostscript to crash or potentially allow an attacker to execute arbitrary code.
Any user or system running the affected versions of Ghostscript is at risk of exploitation via specially-crafted PDF files.