First published: Fri Mar 31 2023(Updated: )
In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex Ghostscript | <10.01.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/ghostscript | <=9.27~dfsg-2+deb10u5 | 9.27~dfsg-2+deb10u9 9.53.3~dfsg-7+deb11u6 9.53.3~dfsg-7+deb11u5 10.0.0~dfsg-11+deb12u2 10.0.0~dfsg-11+deb12u1 10.02.0~dfsg-2 |
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=37ed5022cecd584de868933b5b60da2e995b3179
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-28879.
The severity of CVE-2023-28879 is critical with a CVSS score of 9.8.
Artifex Ghostscript version up to 10.01.0, Debian Debian Linux versions 10.0 and 11.0, and certain versions of the Debian ghostscript package.
Data corruption can occur due to a buffer overflow in the PostScript interpreter, potentially affecting BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode.
You can find more information about CVE-2023-28879 at the following references: [LINK1] [LINK2] [LINK3].