exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-135

Mandriva Linux Security Advisory 2010-135
Posted Jul 16, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-135 - Stack-based buffer overflow in the errprintf function in base/gsmisc.c in ghostscript 8.64 through 8.70 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file, as originally reported for debug logging code in gdevcups.c in the CUPS output driver. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2009-4270
SHA-256 | dbbb7d1d19b0686c9fe07d480902056754e2254f4fda8cce0b3486a5646179bf

Mandriva Linux Security Advisory 2010-135

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:135
http://www.mandriva.com/security/
_______________________________________________________________________

Package : ghostscript
Date : July 15, 2010
Affected: Corporate 4.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in ghostscript:

Stack-based buffer overflow in the errprintf function in base/gsmisc.c
in ghostscript 8.64 through 8.70 allows remote attackers to cause a
denial of service (crash) and possibly execute arbitrary code via a
crafted PDF file, as originally reported for debug logging code in
gdevcups.c in the CUPS output driver (CVE-2009-4270).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4270
_______________________________________________________________________

Updated Packages:

Corporate 4.0:
6678d58a9fbaa84101ca4ac373720e4d corporate/4.0/i586/ghostscript-8.15-46.4.20060mlcs4.i586.rpm
9f43cdac3dea08e4cf9d60f852423b11 corporate/4.0/i586/ghostscript-common-8.15-46.4.20060mlcs4.i586.rpm
0fa2c2e58dd00e9bf040c1e4374534d9 corporate/4.0/i586/ghostscript-dvipdf-8.15-46.4.20060mlcs4.i586.rpm
8b9d1be9204240d6976909628c5bb540 corporate/4.0/i586/ghostscript-module-X-8.15-46.4.20060mlcs4.i586.rpm
28141332bfa7f600abf6d039532e8ac2 corporate/4.0/i586/ghostscript-X-8.15-46.4.20060mlcs4.i586.rpm
437b0369e2f73652718ca9ba256dd8f2 corporate/4.0/i586/libgs8-8.15-46.4.20060mlcs4.i586.rpm
bc5f1d8a48c96b526fbd6ad6359ca1e3 corporate/4.0/i586/libgs8-devel-8.15-46.4.20060mlcs4.i586.rpm
95e7106fab4913bf518811c4e5bb9dde corporate/4.0/i586/libijs1-0.35-46.4.20060mlcs4.i586.rpm
7c436687ba13dd887f020df9bf349751 corporate/4.0/i586/libijs1-devel-0.35-46.4.20060mlcs4.i586.rpm
8cb775bb21996923fdf7fcda83f8b875 corporate/4.0/SRPMS/ghostscript-8.15-46.4.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
885989f897cbdf06de4f162653aabf7c corporate/4.0/x86_64/ghostscript-8.15-46.4.20060mlcs4.x86_64.rpm
aebe81b69bac98a384ec372836f407e7 corporate/4.0/x86_64/ghostscript-common-8.15-46.4.20060mlcs4.x86_64.rpm
d1ebcf429948ce584862134b1cdce5b3 corporate/4.0/x86_64/ghostscript-dvipdf-8.15-46.4.20060mlcs4.x86_64.rpm
32a8d648d0bdd0112c6da2c0e88d7d7b corporate/4.0/x86_64/ghostscript-module-X-8.15-46.4.20060mlcs4.x86_64.rpm
53c9b945243254c7c0238a2f3424bae6 corporate/4.0/x86_64/ghostscript-X-8.15-46.4.20060mlcs4.x86_64.rpm
a4fb31d33215aede77de317d4a5af8cf corporate/4.0/x86_64/lib64gs8-8.15-46.4.20060mlcs4.x86_64.rpm
5a7b25aef9151d01dfeb17ab02e3f0ad corporate/4.0/x86_64/lib64gs8-devel-8.15-46.4.20060mlcs4.x86_64.rpm
30f3ea1e0c1d2596bf0134e39856afec corporate/4.0/x86_64/lib64ijs1-0.35-46.4.20060mlcs4.x86_64.rpm
a63f2d6d8347c2fc71b569db44b88508 corporate/4.0/x86_64/lib64ijs1-devel-0.35-46.4.20060mlcs4.x86_64.rpm
8cb775bb21996923fdf7fcda83f8b875 corporate/4.0/SRPMS/ghostscript-8.15-46.4.20060mlcs4.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFMP38UmqjQ0CJFipgRAl7cAKDLnMKvCBP49oS8bk4sLoqS+CE5SwCfXSy9
BhEOEhIMuCStqROHvbHKFTg=
=WHzR
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close