6.8
CVSSv2

CVE-2008-0411

Published: 28/02/2008 Updated: 16/02/2024
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and previous versions allows remote malicious users to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.

Vulnerable Product Search on Vulmon Subscribe to Product

ghostscript ghostscript

ghostscript ghostscript 0

ghostscript ghostscript 8.0.1

ghostscript ghostscript 8.15

Vendor Advisories

Debian Bug report logs - #468190 ghostscript: CVE-2008-0411 buffer overflow via crafted ps file Package: ghostscript; Maintainer for ghostscript is Debian Printing Team <debian-printing@listsdebianorg>; Source for ghostscript is src:ghostscript (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: ...
Chris Evans discovered that Ghostscript contained a buffer overflow in its color space handling code If a user or automated system were tricked into opening a crafted Postscript file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program (CVE-2008-0411) ...
Chris Evans discovered a buffer overflow in the color space handling code of the Ghostscript PostScript/PDF interpreter, which might result in the execution of arbitrary code if a user is tricked into processing a malformed file For the stable distribution (etch), this problem has been fixed in version 854dfsg1-5etch1 of gs-gpl and 8153dfsg ...

Exploits

source: wwwsecurityfocuscom/bid/28017/info Ghostscript is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input Successfully exploiting this issue may allow remote attackers to execute arbitrary code in the context of the application Failed exploit attempts will cause denia ...

References