Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-2055

Опубликовано: 22 июл. 2010
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2

Описание

Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

9.02~dfsg-2ubuntu1
hardy

ignored

jaunty

ignored

end of life
karmic

ignored

end of life
lucid

ignored

maverick

ignored

natty

not-affected

9.01~dfsg-1ubuntu5
upstream

released

9.00

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

hardy

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

maverick

DNE

natty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

hardy

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

maverick

DNE

natty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

hardy

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

maverick

DNE

natty

DNE

upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 20%
0.00064
Низкий

7.2 High

CVSS2

Связанные уязвимости

redhat
около 15 лет назад

Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.

nvd
около 15 лет назад

Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.

debian
около 15 лет назад

Ghostscript 8.71 and earlier reads initialization files from the curre ...

github
больше 3 лет назад

Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.

oracle-oval
больше 13 лет назад

ELSA-2012-0095: ghostscript security update (MODERATE)

EPSS

Процентиль: 20%
0.00064
Низкий

7.2 High

CVSS2