6.8
CVSSv2

CVE-2015-3228

Published: 11/08/2015 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the gs_heap_alloc_bytes function in base/gsmalloc.c in Ghostscript 9.15 and previous versions allows remote malicious users to cause a denial of service (crash) via a crafted Postscript (ps) file, as demonstrated by using the ps2pdf command, which triggers an out-of-bounds read or write.

Vulnerable Product Search on Vulmon Subscribe to Product

artifex afpl ghostscript

Vendor Advisories

Debian Bug report logs - #793489 ghostscript: CVE-2015-3228: Integer overflow Package: ghostscript; Maintainer for ghostscript is Debian Printing Team <debian-printing@listsdebianorg>; Source for ghostscript is src:ghostscript (PTS, buildd, popcon) Reported by: Raphael Hertzog <hertzog@debianorg> Date: Fri, 24 Jul ...
Ghostscript could be made to crash or run programs if it processed a specially crafted file ...
William Robinet and Stefan Cornelius discovered an integer overflow in Ghostscript, the GPL PostScript/PDF interpreter, which may result in denial of service or potentially execution of arbitrary code if a specially crafted file is opened For the oldstable distribution (wheezy), this problem has been fixed in version 905~dfsg-63+deb7u2 For the ...
An integer overflow flaw was discovered in one of Ghostscript's memory allocation routines A remote attacker could possibly exploit this flaw to cause a crash or, potentially, execute arbitrary code by tricking a user into processing a specially crafted file ...