DSA-286-1 gs-common -- insecure temporary file

Related Vulnerabilities: CVE-2003-0207  

Paul Szabo discovered insecure creation of a temporary file in ps2epsi, a script that is distributed as part of gs-common which contains common files for different Ghostscript releases. ps2epsi uses a temporary file in the process of invoking ghostscript. This file was created in an insecure fashion, which could allow a local attacker to overwrite files owned by a user who invokes ps2epsi. For the stable distribution (woody) this problem has been fixed in version 0.3.3.0woody1. The old stable distribution (potato) is not affected by this problem. For the unstable distribution (sid) this problem has been fixed in version 0.3.3.1. We recommend that you upgrade your gs-common package.

Debian Security Advisory

DSA-286-1 gs-common -- insecure temporary file

Date Reported:
14 Apr 2003
Affected Packages:
gs-common
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 7337.
In Mitre's CVE dictionary: CVE-2003-0207.
More information:

Paul Szabo discovered insecure creation of a temporary file in ps2epsi, a script that is distributed as part of gs-common which contains common files for different Ghostscript releases. ps2epsi uses a temporary file in the process of invoking ghostscript. This file was created in an insecure fashion, which could allow a local attacker to overwrite files owned by a user who invokes ps2epsi.

For the stable distribution (woody) this problem has been fixed in version 0.3.3.0woody1.

The old stable distribution (potato) is not affected by this problem.

For the unstable distribution (sid) this problem has been fixed in version 0.3.3.1.

We recommend that you upgrade your gs-common package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/g/gs-common/gs-common_0.3.3.0woody1.dsc
http://security.debian.org/pool/updates/main/g/gs-common/gs-common_0.3.3.0woody1.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/g/gs-common/gs-common_0.3.3.0woody1_all.deb

MD5 checksums of the listed files are available in the original advisory.