Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qpgp-38q3-x9pp

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.

A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.

EPSS

Процентиль: 15%
0.00049
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 5 лет назад

A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.

CVSS3: 5.5
redhat
около 5 лет назад

A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.

CVSS3: 5.5
nvd
около 5 лет назад

A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.

CVSS3: 5.5
debian
около 5 лет назад

A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of g ...

rocky
больше 4 лет назад

Moderate: ghostscript security, bug fix, and enhancement update

EPSS

Процентиль: 15%
0.00049
Низкий