First published: Thu Feb 28 2008(Updated: )
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Mandrake Linux | =2007 | |
Mandrake Linux | =2007.0_x86_64 | |
Mandrake Linux | =2007.1 | |
Mandrake Linux | =2007.1 | |
Mandrake Linux | =2008.0 | |
Mandrake Linux | =2008.0 | |
Mandriva Linux Corporate Server | =3.0 | |
Mandriva Linux Corporate Server | =4.0 | |
Mandrakesoft Corporate Server | =3.0_x86_64 | |
Mandrakesoft Corporate Server | =4.0_x86_64 | |
Red Hat Desktop-file-utils | =3.0 | |
Red Hat Desktop-file-utils | =4.0 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =as_3 | |
Red Hat Enterprise Linux | =as_4 | |
Red Hat Enterprise Linux | =es_3 | |
Red Hat Enterprise Linux | =es_4 | |
Red Hat Enterprise Linux | =ws_3 | |
Red Hat Enterprise Linux | =ws_4 | |
Red Hat Enterprise Linux Desktop | =5 | |
Red Hat Enterprise Linux Workstation | =5 | |
Rpath Linux | =1 | |
SUSE Linux Enterprise Point of Service | =9 | |
SUSE Linux | =10.2 | |
SUSE Linux | =10.3 | |
SUSE Linux | =9.0 | |
SUSE Linux | =10-sp1 | |
SUSE Linux | =10-sp1 | |
SUSE Linux | =10.1 | |
SUSE Linux | =10.1 | |
SUSE Linux | =10.1 | |
SUSE Open Enterprise Server | =0 | |
Ghostscript | <=8.61 | |
Ghostscript | =0 | |
Ghostscript | =8.0.1 | |
Ghostscript | =8.15 | |
All of | ||
Any of | ||
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Mandrake Linux | =2007 | |
Mandrake Linux | =2007.0_x86_64 | |
Mandrake Linux | =2007.1 | |
Mandrake Linux | =2007.1 | |
Mandrake Linux | =2008.0 | |
Mandrake Linux | =2008.0 | |
Mandriva Linux Corporate Server | =3.0 | |
Mandriva Linux Corporate Server | =4.0 | |
Mandrakesoft Corporate Server | =3.0_x86_64 | |
Mandrakesoft Corporate Server | =4.0_x86_64 | |
Red Hat Desktop-file-utils | =3.0 | |
Red Hat Desktop-file-utils | =4.0 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =as_3 | |
Red Hat Enterprise Linux | =as_4 | |
Red Hat Enterprise Linux | =es_3 | |
Red Hat Enterprise Linux | =es_4 | |
Red Hat Enterprise Linux | =ws_3 | |
Red Hat Enterprise Linux | =ws_4 | |
Red Hat Enterprise Linux Desktop | =5 | |
Red Hat Enterprise Linux Workstation | =5 | |
Rpath Linux | =1 | |
SUSE Linux Enterprise Point of Service | =9 | |
SUSE Linux | =10.2 | |
SUSE Linux | =10.3 | |
SUSE Linux | =9.0 | |
SUSE Linux | =10-sp1 | |
SUSE Linux | =10-sp1 | |
SUSE Linux | =10.1 | |
SUSE Linux | =10.1 | |
SUSE Linux | =10.1 | |
SUSE Open Enterprise Server | =0 | |
Ghostscript | <=8.61 | |
All of | ||
Any of | ||
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Any of | ||
Ghostscript | =0 | |
Ghostscript | =8.0.1 | |
Ghostscript | =8.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0411 has been classified as a critical vulnerability, allowing for remote code execution through specially crafted PostScript files.
To fix CVE-2008-0411, update Ghostscript to a version later than 8.61, which addresses this buffer overflow issue.
CVE-2008-0411 affects Ghostscript versions 8.61 and earlier, potentially impacting various distributions like Debian and Mandriva.
Yes, CVE-2008-0411 can be exploited remotely by leveraging a malicious PostScript file.
CVE-2008-0411 is a stack-based buffer overflow vulnerability.