First published: Wed Jun 17 2015(Updated: )
Integer overflow in the gs_heap_alloc_bytes function in base/gsmalloc.c in Ghostscript 9.15 and earlier allows remote attackers to cause a denial of service (crash) via a crafted Postscript (ps) file, as demonstrated by using the ps2pdf command, which triggers an out-of-bounds read or write.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/GhostScript | <9.10 | 9.10 |
Ghostscript | <=9.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3228 has been rated as critical due to its potential to cause denial of service through integer overflow.
To fix CVE-2015-3228, upgrade Ghostscript to version 9.16 or later.
Ghostscript versions 9.15 and earlier are affected by CVE-2015-3228.
Yes, CVE-2015-3228 can be exploited remotely via a specially crafted Postscript file.
CVE-2015-3228 is associated with denial of service attacks due to an integer overflow exploit.