CWE
119
Advisory Published
Updated

CVE-2008-0411: Buffer Overflow

First published: Thu Feb 28 2008(Updated: )

Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Mandrake Linux=2007
Mandrake Linux=2007.0_x86_64
Mandrake Linux=2007.1
Mandrake Linux=2007.1
Mandrake Linux=2008.0
Mandrake Linux=2008.0
Mandriva Linux Corporate Server=3.0
Mandriva Linux Corporate Server=4.0
Mandrakesoft Corporate Server=3.0_x86_64
Mandrakesoft Corporate Server=4.0_x86_64
Red Hat Desktop-file-utils=3.0
Red Hat Desktop-file-utils=4.0
Red Hat Enterprise Linux=5
Red Hat Enterprise Linux=as_3
Red Hat Enterprise Linux=as_4
Red Hat Enterprise Linux=es_3
Red Hat Enterprise Linux=es_4
Red Hat Enterprise Linux=ws_3
Red Hat Enterprise Linux=ws_4
Red Hat Enterprise Linux Desktop=5
Red Hat Enterprise Linux Workstation=5
Rpath Linux=1
SUSE Linux Enterprise Point of Service=9
SUSE Linux=10.2
SUSE Linux=10.3
SUSE Linux=9.0
SUSE Linux=10-sp1
SUSE Linux=10-sp1
SUSE Linux=10.1
SUSE Linux=10.1
SUSE Linux=10.1
SUSE Open Enterprise Server=0
Ghostscript<=8.61
Ghostscript=0
Ghostscript=8.0.1
Ghostscript=8.15
All of
Any of
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Mandrake Linux=2007
Mandrake Linux=2007.0_x86_64
Mandrake Linux=2007.1
Mandrake Linux=2007.1
Mandrake Linux=2008.0
Mandrake Linux=2008.0
Mandriva Linux Corporate Server=3.0
Mandriva Linux Corporate Server=4.0
Mandrakesoft Corporate Server=3.0_x86_64
Mandrakesoft Corporate Server=4.0_x86_64
Red Hat Desktop-file-utils=3.0
Red Hat Desktop-file-utils=4.0
Red Hat Enterprise Linux=5
Red Hat Enterprise Linux=as_3
Red Hat Enterprise Linux=as_4
Red Hat Enterprise Linux=es_3
Red Hat Enterprise Linux=es_4
Red Hat Enterprise Linux=ws_3
Red Hat Enterprise Linux=ws_4
Red Hat Enterprise Linux Desktop=5
Red Hat Enterprise Linux Workstation=5
Rpath Linux=1
SUSE Linux Enterprise Point of Service=9
SUSE Linux=10.2
SUSE Linux=10.3
SUSE Linux=9.0
SUSE Linux=10-sp1
SUSE Linux=10-sp1
SUSE Linux=10.1
SUSE Linux=10.1
SUSE Linux=10.1
SUSE Open Enterprise Server=0
Ghostscript<=8.61
All of
Any of
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=3.1
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Debian=4.0
Any of
Ghostscript=0
Ghostscript=8.0.1
Ghostscript=8.15

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2008-0411?

    CVE-2008-0411 has been classified as a critical vulnerability, allowing for remote code execution through specially crafted PostScript files.

  • How do I fix CVE-2008-0411?

    To fix CVE-2008-0411, update Ghostscript to a version later than 8.61, which addresses this buffer overflow issue.

  • Which software is affected by CVE-2008-0411?

    CVE-2008-0411 affects Ghostscript versions 8.61 and earlier, potentially impacting various distributions like Debian and Mandriva.

  • Can CVE-2008-0411 be exploited remotely?

    Yes, CVE-2008-0411 can be exploited remotely by leveraging a malicious PostScript file.

  • What type of vulnerability is CVE-2008-0411?

    CVE-2008-0411 is a stack-based buffer overflow vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203