Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2008-0155

Опубликовано: 28 фев. 2008
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2008-0155: Important: ghostscript security update (IMPORTANT)

[ 7.05-32.1.13]

  • Applied patch to fix CVE-2008-0411 (bug #433366).

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

ghostscript

8.15.2-9.1.el5_1.1

ghostscript-devel

8.15.2-9.1.el5_1.1

ghostscript-gtk

8.15.2-9.1.el5_1.1

Oracle Linux i386

ghostscript

8.15.2-9.1.el5_1.1

ghostscript-devel

8.15.2-9.1.el5_1.1

ghostscript-gtk

8.15.2-9.1.el5_1.1

Связанные CVE

Связанные уязвимости

ubuntu
больше 17 лет назад

Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.

redhat
больше 17 лет назад

Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.

nvd
больше 17 лет назад

Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.

debian
больше 17 лет назад

Stack-based buffer overflow in the zseticcspace function in zicc.c in ...

github
около 3 лет назад

Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.

Уязвимость ELSA-2008-0155