Описание
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
Ссылки
- Mailing ListThird Party Advisory
 - Exploit
 - URL Repurposed
 - URL Repurposed
 - URL Repurposed
 - URL Repurposed
 - URL Repurposed
 - URL Repurposed
 - URL Repurposed
 - URL Repurposed
 - URL Repurposed
 - URL Repurposed
 - Mailing List
 - Broken Link
 - Patch
 - Patch
 - Third Party Advisory
 - URL Repurposed
 - Broken LinkVDB Entry
 - Broken LinkVDB Entry
 
Уязвимые конфигурации
Одновременно
Одно из
Одновременно
Одно из
Одно из
EPSS
6.8 Medium
CVSS2
Дефекты
Связанные уязвимости
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
Stack-based buffer overflow in the zseticcspace function in zicc.c in ...
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
ELSA-2008-0155: Important: ghostscript security update (IMPORTANT)
EPSS
6.8 Medium
CVSS2