Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Moderately critical

GhostScript PostScript File Processing Vulnerabilities

-

Release Date:  2010-05-12    Last Update:  2010-11-26    Views:  4,868

Secunia Advisory SA39753

Where:

From remote

Impact:

DoS, System access

Solution Status:

Partial Fix

Software:

CVE Reference(s):

Description


Some vulnerabilities have been reported in GhostScript, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system.

1) An error in the processing of PostScript files can be exploited to cause a memory corruption via recursive function calls and may allow execution of arbitrary code via a specially crafted PostScript file.

2) An error in the handling of overly long identifiers can be exploited to cause a stack-based buffer overflow via a specially crafted PostScript file.

Successful exploitation allows execution of arbitrary code.

3) An off-by-one error in "Ins_MINDEX()" within the TrueType bytecode interpreter can be exploited to corrupt heap-based memory via a file with a specially crafted TrueType font.

These vulnerabilities are reported in 8.70. Other versions may also be affected.

4) An input validation error in the font interpreters can be exploited to cause a crash via a specially crafted PDF file.


Solution:
Update to version 8.71, which fixes vulnerabilities #2, #3, and #4. Do not process untrusted PostScript files.

Provided and/or discovered by:
1) Dan Rosenberg
2) Independently discovered by Dan Rosenberg and Rodrigo Rubira Branco, Check Point Vulnerability Discovery Team (VDT).
3, 4) Jonathan Brossard, Toucan System

Original Advisory:
Dan Rosenberg:
http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0135.html
https://bugs.launchpad.net/ubuntu/+source/ghostscript/+bug/546009
http://bugs.ghostscript.com/show_bug.cgi?id=691295

Jonathan Brossard:
http://www.toucan-system.com/advisories/tssa-2010-01.txt

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: GhostScript PostScript File Processing Vulnerabilities

User Message
zappe RE: GhostScript PostScript File Processing Vulnerabilities
Member 17th Nov, 2010 13:53
Score: 3
Posts: 17
User Since: 4th Jan 2008
System Score: 96%
Location: SE
Last edited on 17th Nov, 2010 13:53
Is this solved in 9.00?
Was this reply relevant?
+0
-0

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability