9.3
CVSSv2

CVE-2009-4270

Published: 21/12/2009 Updated: 09/01/2015
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in the errprintf function in base/gsmisc.c in ghostscript 8.64 up to and including 8.70 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file, as originally reported for debug logging code in gdevcups.c in the CUPS output driver.

Vulnerable Product Search on Vulmon Subscribe to Product

ghostscript ghostscript 8.64

ghostscript ghostscript 8.70

Vendor Advisories

Debian Bug report logs - #562643 CVE-2009-4270: Stack-based buffer overflow in the errprintf function Package: ghostscript; Maintainer for ghostscript is Debian Printing Team <debian-printing@listsdebianorg>; Source for ghostscript is src:ghostscript (PTS, buildd, popcon) Reported by: Giuseppe Iuculano <iuculano@debian ...
David Srbecky discovered that Ghostscript incorrectly handled debug logging If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program This issue only affected Ubuntu 904 and Ubuntu 910 The default compiler op ...
Several security issues have been discovered in Ghostscript, a GPL PostScript/PDF interpreter, which might lead to the execution of arbitrary code if a user processes a malformed PDF or Postscript file For the stable distribution (lenny), these problems have been fixed in version 862dfsg1-32lenny4 For the unstable distribution (sid), these pr ...