ghostscript, gs-esp, gs-gpl vulnerability

Related Vulnerabilities: CVE-2008-0411  

Chris Evans discovered that Ghostscript contained a buffer overflow in its color space handling code. If a user or automated system were tricked into opening a crafted Postscript file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. (CVE-2008-0411)

The problem can be corrected by updating your system to the following package versions:

9 April 2008

ghostscript, gs-esp, gs-gpl vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 7.10
  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06 LTS

Software Description

  • ghostscript
  • gs-esp
  • gs-gpl

Details

Chris Evans discovered that Ghostscript contained a buffer overflow in its color space handling code. If a user or automated system were tricked into opening a crafted Postscript file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. (CVE-2008-0411)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 7.10
libgs8 - 8.61.dfsg.1~svn8187-0ubuntu3.4
Ubuntu 7.04
gs-esp - 8.15.4.dfsg.1-0ubuntu1.1
gs-gpl - 8.54.dfsg.1-5ubuntu0.2
Ubuntu 6.10
gs-esp - 8.15.2.dfsg.0ubuntu1-0ubuntu4.1
gs-gpl - 8.50-1.1ubuntu1.2
Ubuntu 6.06 LTS
gs-esp - 8.15.2.dfsg.0ubuntu1-0ubuntu1.1
gs-gpl - 8.15-4ubuntu3.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the necessary changes.

References