9.3
CVSSv2

CVE-2010-1628

Published: 19/05/2010 Updated: 10/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent malicious users to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

artifex gpl ghostscript 8.64

artifex gpl ghostscript 8.70

Vendor Advisories

Debian Bug report logs - #584516 CVE-2010-1628: allows context-dependent attackers to execute arbitrary code Package: ghostscript; Maintainer for ghostscript is Debian Printing Team <debian-printing@listsdebianorg>; Source for ghostscript is src:ghostscript (PTS, buildd, popcon) Reported by: Giuseppe Iuculano <iuculano@ ...
David Srbecky discovered that Ghostscript incorrectly handled debug logging If a user or automated system were tricked into opening a crafted PDF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program This issue only affected Ubuntu 904 and Ubuntu 910 The default compiler op ...