ghostscript, gs-gpl vulnerabilities

Related Vulnerabilities: CVE-2009-0583   CVE-2009-0584  

It was discovered that Ghostscript contained multiple integer overflows in its ICC color management library. If a user or automated system were tricked into opening a crafted Postscript file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. (CVE-2009-0583)

It was discovered that Ghostscript did not properly perform bounds checking in its ICC color management library. If a user or automated system were tricked into opening a crafted Postscript file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. (CVE-2009-0584)

23 March 2009

ghostscript, gs-gpl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 8.10
  • Ubuntu 8.04 LTS
  • Ubuntu 7.10
  • Ubuntu 6.06 LTS

Software Description

  • ghostscript
  • gs-gpl

Details

It was discovered that Ghostscript contained multiple integer overflows in its ICC color management library. If a user or automated system were tricked into opening a crafted Postscript file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. (CVE-2009-0583)

It was discovered that Ghostscript did not properly perform bounds checking in its ICC color management library. If a user or automated system were tricked into opening a crafted Postscript file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. (CVE-2009-0584)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 8.10
libgs8 - 8.63.dfsg.1-0ubuntu6.3
Ubuntu 8.04 LTS
libgs8 - 8.61.dfsg.1-1ubuntu3.1
Ubuntu 7.10
libgs8 - 8.61.dfsg.1~svn8187-0ubuntu3.5
Ubuntu 6.06 LTS
gs-gpl - 8.15-4ubuntu3.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the necessary changes.

References