Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-67rg-j83g-ppg2

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter.

Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter.

EPSS

Процентиль: 89%
0.0512
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 15 лет назад

Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter.

redhat
больше 15 лет назад

Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter.

nvd
больше 15 лет назад

Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter.

debian
больше 15 лет назад

Ghostscript 8.64, 8.70, and possibly other versions allows context-dep ...

fstec
почти 11 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 89%
0.0512
Низкий

Дефекты

CWE-119