First published: Tue Jul 28 2020(Updated: )
A memory corruption issue was found in Artifex Ghostscript 9.50 and 9.52. Use of a non-standard PostScript operator can allow overriding of file access controls. The 'rsearch' calculation for the 'post' size resulted in a size that was too large, and could underflow to max uint32_t. This was fixed in commit 5d499272b95a6b890a1397e11d20937de000d31b.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex Ghostscript | =9.50 | |
Artifex Ghostscript | =9.52 | |
Canonical Ubuntu Linux | =20.04 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
ubuntu/ghostscript | <9.50~dfsg-5ubuntu4.1 | 9.50~dfsg-5ubuntu4.1 |
debian/ghostscript | 9.53.3~dfsg-7+deb11u7 10.0.0~dfsg-11+deb12u4 10.0.0~dfsg-11+deb12u5 10.03.1~dfsg-2 |
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5d499272b95a6b890a1397e11d20937de000d31b
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15900 is a memory corruption vulnerability found in Artifex Ghostscript 9.50 and 9.52.
The severity of CVE-2020-15900 is critical with a CVSS score of 9.8.
The affected software includes Artifex Ghostscript versions 9.50 and 9.52, as well as Ubuntu Linux 20.04 and openSUSE Leap 15.1/15.2.
The vulnerability can be exploited by using a non-standard PostScript operator to override file access controls.
Yes, there are fixes available. Please refer to the provided references for more information on the fixes.