9.3
CVSSv2

CVE-2009-0792

Published: 14/04/2009 Updated: 10/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent malicious users to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images. NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.

Affected Products

Vendor Product Versions
ArgyllcmsArgyllcms0.1.0, 0.2.0, 0.2.1, 0.2.2, 0.3.0, 0.6.0, 0.7.0, 1.0.0, 1.0.2, 1.0.3
GhostscriptGhostscript5.50, 7.05, 7.07, 8.0.1, 8.15, 8.15.2, 8.54, 8.56, 8.57, 8.61, 8.62, 8.63, 8.64

Vendor Advisories

Debian Bug report logs - #523472 argyll: CVE-2009-0792 integer overflows Package: argyll; Maintainer for argyll is Jörg Frings-Fürst <debian@jffemail>; Source for argyll is src:argyll (PTS, buildd, popcon) Reported by: "Michael S Gilbert" <michaelsgilbert@gmailcom> Date: Fri, 10 Apr 2009 14:24:02 UTC Severity ...
Synopsis Moderate: ghostscript security update Type/Severity Security Advisory: Moderate Topic Updated ghostscript packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 3 and 4This update has been rated as having moderate security impact by the RedHat Security Response Te ...
Synopsis Moderate: ghostscript security update Type/Severity Security Advisory: Moderate Topic Updated ghostscript packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 5This update has been rated as having moderate security impact by the RedHat Security Response Team ...
Debian Bug report logs - #522416 ghostscript: CVE-2009-058{3,4} multiple integer overflows resulting in arbitrary code execution Package: ghostscript; Maintainer for ghostscript is Debian Printing Team <debian-printing@listsdebianorg>; Source for ghostscript is src:ghostscript (PTS, buildd, popcon) Reported by: Nico Golde ...
It was discovered that Ghostscript contained a buffer underflow in its CCITTFax decoding filter If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program (CVE-2007-6725) ...
Debian Bug report logs - #524803 ghostscript: multiple vulnerabilities Package: ghostscript; Maintainer for ghostscript is Debian Printing Team <debian-printing@listsdebianorg>; Source for ghostscript is src:ghostscript (PTS, buildd, popcon) Reported by: "Michael S Gilbert" <michaelsgilbert@gmailcom> Date: Mon, ...
Several security issues have been discovered in Ghostscript, a GPL PostScript/PDF interpreter, which might lead to the execution of arbitrary code if a user processes a malformed PDF or Postscript file For the stable distribution (lenny), these problems have been fixed in version 862dfsg1-32lenny4 For the unstable distribution (sid), these pr ...

References

CWE-189http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.htmlhttp://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.htmlhttp://secunia.com/advisories/34373http://secunia.com/advisories/34667http://secunia.com/advisories/34711http://secunia.com/advisories/34726http://secunia.com/advisories/34729http://secunia.com/advisories/34732http://secunia.com/advisories/35416http://secunia.com/advisories/35559http://secunia.com/advisories/35569http://security.gentoo.org/glsa/glsa-201412-17.xmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1http://support.avaya.com/elmodocs2/security/ASA-2009-155.htmhttp://wiki.rpath.com/Advisories:rPSA-2009-0060http://www.mandriva.com/security/advisories?name=MDVSA-2009:095http://www.mandriva.com/security/advisories?name=MDVSA-2009:096http://www.redhat.com/support/errata/RHSA-2009-0420.htmlhttp://www.redhat.com/support/errata/RHSA-2009-0421.htmlhttp://www.securityfocus.com/archive/1/502757/100/0/threadedhttp://www.vupen.com/english/advisories/2009/1708https://bugzilla.redhat.com/show_bug.cgi?id=491853https://exchange.xforce.ibmcloud.com/vulnerabilities/50381https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11207https://usn.ubuntu.com/757-1/https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00211.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00217.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00460.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00461.htmlhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523472https://www.rapid7.com/db/vulnerabilities/suse-cve-2009-0792https://nvd.nist.govhttps://usn.ubuntu.com/757-1/