First published: Thu Sep 06 2012(Updated: )
** DISPUTED ** Heap-based buffer overflow in gdevwpr2.c in Ghostscript 9.04, when processing the OutputFile device parameter, allows user-assisted remote attackers to execute arbitrary code via a long file name in a PostScript document. NOTE: as of 20120314, the developer was not able to reproduce the issue and disputed it.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ghostscript | =9.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4875 is classified as a critical vulnerability due to the potential for arbitrary code execution.
To remediate CVE-2012-4875, upgrade to a later version of Ghostscript that addresses this vulnerability.
CVE-2012-4875 specifically affects Ghostscript version 9.04.
Yes, CVE-2012-4875 can be exploited by remote attackers with user-assisted actions, such as opening a malicious PostScript document.
CVE-2012-4875 is a heap-based buffer overflow vulnerability.