First published: Thu Jan 05 2012(Updated: )
Ghostscript included the current working directory in its library search path by default. If a user ran Ghostscript without the "-P-" option in an attacker-controlled directory containing a specially-crafted PostScript library file, it could cause Ghostscript to execute arbitrary PostScript code. With this update, Ghostscript no longer searches the current working directory for library files by default. (<a href="https://access.redhat.com/security/cve/CVE-2010-4820">CVE-2010-4820</a>) Note: The fix for <a href="https://access.redhat.com/security/cve/CVE-2010-4820">CVE-2010-4820</a> could possibly break existing configurations. To use the previous, vulnerable behavior, run Ghostscript with the "-P" option (to always search the current working directory first).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ghostscript Ghostscript | =8.62 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.