First published: Tue Nov 24 2009(Updated: )
Stack-based buffer overflow in the errprintf function in base/gsmisc.c in ghostscript 8.64 through 8.70 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file, as originally reported for debug logging code in gdevcups.c in the CUPS output driver.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/8.70 | <2. | 2. |
Artifex Ghostscript | =8.64 | |
Artifex Ghostscript | =8.70 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4270 is considered a critical vulnerability due to its potential to cause a denial of service and allow remote code execution.
To fix CVE-2009-4270, update Ghostscript to version 8.71 or later, which addresses the buffer overflow issue.
CVE-2009-4270 affects Ghostscript versions 8.64 through 8.70.
Yes, CVE-2009-4270 can be exploited remotely through specially crafted PDF files.
CVE-2009-4270 can facilitate denial of service attacks and possibly the execution of arbitrary code.