Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qpgp-38q3-x9pp

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.

A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.

EPSS

Процентиль: 28%
0.00094
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 5 лет назад

A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.

CVSS3: 5.5
redhat
почти 5 лет назад

A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.

CVSS3: 5.5
nvd
почти 5 лет назад

A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.

CVSS3: 5.5
debian
почти 5 лет назад

A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of g ...

rocky
около 4 лет назад

Moderate: ghostscript security, bug fix, and enhancement update

EPSS

Процентиль: 28%
0.00094
Низкий