Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2010-2055

Опубликовано: 22 июл. 2010
Источник: nvd
CVSS2: 7.2
EPSS Низкий

Описание

Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*
cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*
cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*
Версия до 8.71 (включая)
cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*

EPSS

Процентиль: 20%
0.00064
Низкий

7.2 High

CVSS2

Дефекты

CWE-17

Связанные уязвимости

ubuntu
около 15 лет назад

Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.

redhat
около 15 лет назад

Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.

debian
около 15 лет назад

Ghostscript 8.71 and earlier reads initialization files from the curre ...

github
больше 3 лет назад

Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.

oracle-oval
больше 13 лет назад

ELSA-2012-0095: ghostscript security update (MODERATE)

EPSS

Процентиль: 20%
0.00064
Низкий

7.2 High

CVSS2

Дефекты

CWE-17