First published: Fri Feb 27 2009(Updated: )
icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Argyllcms | <=1.0.3 | |
Ghostscript | <=8.64 | |
Ghostscript | =0 | |
Ghostscript | =5.50 | |
Ghostscript | =7.05 | |
Ghostscript | =7.07 | |
Ghostscript | =8.0.1 | |
Ghostscript | =8.15 | |
Ghostscript | =8.15.2 | |
Ghostscript | =8.54 | |
Ghostscript | =8.56 | |
Ghostscript | =8.57 | |
Ghostscript | =8.60 | |
Ghostscript | =8.61 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0584 has a severity rating that indicates it can lead to denial of service and potentially execute arbitrary code.
To fix CVE-2009-0584, update to versions of Ghostscript later than 8.64 and Argyll CMS versions later than 1.0.3.
CVE-2009-0584 affects Ghostscript versions up to 8.64 and Argyll Color Management System versions up to 1.0.3.
Yes, CVE-2009-0584 can be exploited by context-dependent attackers, potentially leading to a crash or arbitrary code execution.
Yes, users should apply patches provided in the latest releases of the affected software to mitigate CVE-2009-0584.