Описание
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
Ссылки
- Mailing ListThird Party Advisory
- Exploit
- URL Repurposed
- URL Repurposed
- URL Repurposed
- URL Repurposed
- URL Repurposed
- URL Repurposed
- URL Repurposed
- URL Repurposed
- URL Repurposed
- URL Repurposed
- Mailing List
- Broken Link
- Patch
- Patch
- Third Party Advisory
- URL Repurposed
- Broken LinkVDB Entry
- Broken LinkVDB Entry
Уязвимые конфигурации
Одновременно
Одно из
Одновременно
Одно из
Одно из
EPSS
6.8 Medium
CVSS2
Дефекты
Связанные уязвимости
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
Stack-based buffer overflow in the zseticcspace function in zicc.c in ...
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
ELSA-2008-0155: Important: ghostscript security update (IMPORTANT)
EPSS
6.8 Medium
CVSS2