First published: Mon Jul 12 2010(Updated: )
A memory corruption vulnerability caused by long names was discovered [1] in Ghostscript 8.64 and earlier. A specially crafted PDF file could result in the execution of arbitrary code if opened or printed (i.e. via CUPS). This was corrected in upstream Ghostscript 8.70 [2], version 8.64 and previous are affected by this flaw (all the way back to Ghostscript 7.05). References: [1] <a href="http://bugs.ghostscript.com/show_bug.cgi?id=690523">http://bugs.ghostscript.com/show_bug.cgi?id=690523</a> [2] <a href="http://svn.ghostscript.com/viewvc?view=rev&revision=9797">http://svn.ghostscript.com/viewvc?view=rev&revision=9797</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex Ghostscript | <=8.64>=7.05 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-613792 is critical due to the potential for arbitrary code execution.
To fix REDHAT-BUG-613792, upgrade to Ghostscript version 8.70 or newer.
Ghostscript versions up to and including 8.64 are affected by REDHAT-BUG-613792.
REDHAT-BUG-613792 is a memory corruption vulnerability caused by long names in PDF files.
Yes, REDHAT-BUG-613792 can be exploited by opening or printing a specially crafted PDF file.