First published: Tue Mar 24 2009(Updated: )
Multiple integer overflows and multiple insufficient upper-bounds checks on certain variable sizes were originally discovered in the Ghostscript's International Color Consortium Format Library (icclib). It was found, the original patch, addressing this issue was incomplete.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ghostscript | <0:7.07-33.2.el4_7.8 | 0:7.07-33.2.el4_7.8 |
redhat/ghostscript | <0:8.15.2-9.4.el5_3.7 | 0:8.15.2-9.4.el5_3.7 |
Ghostscript | <=8.64 | |
Ghostscript | =5.50 | |
Ghostscript | =7.05 | |
Ghostscript | =7.07 | |
Ghostscript | =8.0.1 | |
Ghostscript | =8.15 | |
Ghostscript | =8.15.2 | |
Ghostscript | =8.54 | |
Ghostscript | =8.56 | |
Ghostscript | =8.57 | |
Ghostscript | =8.61 | |
Ghostscript | =8.62 | |
Ghostscript | =8.63 | |
Usualtool CMS | <=1.0.3 | |
Usualtool CMS | =0.1.0 | |
Usualtool CMS | =0.2.0 | |
Usualtool CMS | =0.2.1 | |
Usualtool CMS | =0.2.2 | |
Usualtool CMS | =0.3.0 | |
Usualtool CMS | =0.6.0 | |
Usualtool CMS | =0.7.0-beta_8 | |
Usualtool CMS | =1.0.0 | |
Usualtool CMS | =1.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0792 has a high severity rating due to multiple integer overflows which could lead to potential code execution vulnerabilities.
To remediate CVE-2009-0792, update to the latest version of Ghostscript or apply the relevant patches provided by your software vendor.
CVE-2009-0792 affects multiple versions of Ghostscript, specifically those prior to 8.64 and includes versions such as 5.50, 7.05, 7.07, and 8.15, among others.
Exploitation of CVE-2009-0792 can enable attackers to execute arbitrary code remotely by processing specially crafted ICC format files.
Yes, there is a permanent solution for CVE-2009-0792 by upgrading to patched versions of the Ghostscript software, thus eliminating the vulnerabilities.