First published: Wed Dec 06 2023(Updated: )
An issue was discovered in the function gdev_prn_open_printer_seekable() in Artifex Ghostscript through 10.02.0 allows remote attackers to crash the application via a dangling pointer.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex Ghostscript | <=10.02.0 | |
ubuntu/ghostscript | <9.55.0~dfsg1-0ubuntu5.6 | 9.55.0~dfsg1-0ubuntu5.6 |
ubuntu/ghostscript | <10.0.0~dfsg1-0ubuntu1.5 | 10.0.0~dfsg1-0ubuntu1.5 |
ubuntu/ghostscript | <10.01.2~dfsg1-0ubuntu2.2 | 10.01.2~dfsg1-0ubuntu2.2 |
ubuntu/ghostscript | <10.02.1~dfsg-1 | 10.02.1~dfsg-1 |
debian/ghostscript | 9.27~dfsg-2+deb10u5 9.27~dfsg-2+deb10u9 9.53.3~dfsg-7+deb11u6 9.53.3~dfsg-7+deb11u5 10.0.0~dfsg-11+deb12u3 10.02.1~dfsg-3 |
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=dcdbc595c13c9d11d235702dff46bb74c80f7698
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-46751.
The title of the vulnerability is 'An issue was discovered in the function gdev_prn_open_printer_seekable() in Artifex Ghostscript through 10.02.0 allows remote attackers to crash the application via a dangling pointer.'
The affected software is Artifex Ghostscript version up to and including 10.02.0.
The severity of the vulnerability is high with a CVSS score of 7.5.
To fix this vulnerability, it is recommended to update to a version of Artifex Ghostscript that is not affected.