First published: Thu Feb 02 2012(Updated: )
Ghostscript is a set of software that provides a PostScript interpreter, a<br>set of C procedures (the Ghostscript library, which implements the graphics<br>capabilities in the PostScript language) and an interpreter for Portable<br>Document Format (PDF) files.<br>An integer overflow flaw was found in Ghostscript's TrueType bytecode<br>interpreter. An attacker could create a specially-crafted PostScript or PDF<br>file that, when interpreted, could cause Ghostscript to crash or,<br>potentially, execute arbitrary code. (CVE-2009-3743)<br>It was found that Ghostscript always tried to read Ghostscript system<br>initialization files from the current working directory before checking<br>other directories, even if a search path that did not contain the current<br>working directory was specified with the "-I" option, or the "-P-" option<br>was used (to prevent the current working directory being searched first).<br>If a user ran Ghostscript in an attacker-controlled directory containing a<br>system initialization file, it could cause Ghostscript to execute arbitrary<br>PostScript code. (CVE-2010-2055)<br>Ghostscript included the current working directory in its library search<br>path by default. If a user ran Ghostscript without the "-P-" option in an<br>attacker-controlled directory containing a specially-crafted PostScript<br>library file, it could cause Ghostscript to execute arbitrary PostScript<br>code. With this update, Ghostscript no longer searches the current working<br>directory for library files by default. (CVE-2010-4820)<br>Note: The fix for CVE-2010-4820 could possibly break existing<br>configurations. To use the previous, vulnerable behavior, run Ghostscript<br>with the "-P" option (to always search the current working directory<br>first).<br>A flaw was found in the way Ghostscript interpreted PostScript Type 1 and<br>PostScript Type 2 font files. An attacker could create a specially-crafted<br>PostScript Type 1 or PostScript Type 2 font file that, when interpreted,<br>could cause Ghostscript to crash or, potentially, execute arbitrary code.<br>(CVE-2010-4054)<br>Users of Ghostscript are advised to upgrade to these updated packages,<br>which contain backported patches to correct these issues.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ghostscript | <8.70-11.el6_2.6 | 8.70-11.el6_2.6 |
redhat/ghostscript | <8.70-11.el6_2.6 | 8.70-11.el6_2.6 |
redhat/ghostscript-debuginfo | <8.70-11.el6_2.6 | 8.70-11.el6_2.6 |
redhat/ghostscript-debuginfo | <8.70-11.el6_2.6 | 8.70-11.el6_2.6 |
redhat/ghostscript-devel | <8.70-11.el6_2.6 | 8.70-11.el6_2.6 |
redhat/ghostscript-devel | <8.70-11.el6_2.6 | 8.70-11.el6_2.6 |
redhat/ghostscript-doc | <8.70-11.el6_2.6 | 8.70-11.el6_2.6 |
redhat/ghostscript-gtk | <8.70-11.el6_2.6 | 8.70-11.el6_2.6 |
redhat/ghostscript-doc | <8.70-11.el6_2.6 | 8.70-11.el6_2.6 |
redhat/ghostscript-gtk | <8.70-11.el6_2.6 | 8.70-11.el6_2.6 |
redhat/ghostscript | <8.70-6.el5_7.6 | 8.70-6.el5_7.6 |
redhat/ghostscript | <8.70-6.el5_7.6 | 8.70-6.el5_7.6 |
redhat/ghostscript-devel | <8.70-6.el5_7.6 | 8.70-6.el5_7.6 |
redhat/ghostscript-devel | <8.70-6.el5_7.6 | 8.70-6.el5_7.6 |
redhat/ghostscript-gtk | <8.70-6.el5_7.6 | 8.70-6.el5_7.6 |
redhat/ghostscript-gtk | <8.70-6.el5_7.6 | 8.70-6.el5_7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.