exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-135

Mandriva Linux Security Advisory 2010-135
Posted Jul 16, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-135 - Stack-based buffer overflow in the errprintf function in base/gsmisc.c in ghostscript 8.64 through 8.70 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file, as originally reported for debug logging code in gdevcups.c in the CUPS output driver. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2009-4270
SHA-256 | dbbb7d1d19b0686c9fe07d480902056754e2254f4fda8cce0b3486a5646179bf

Mandriva Linux Security Advisory 2010-135

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:135
http://www.mandriva.com/security/
_______________________________________________________________________

Package : ghostscript
Date : July 15, 2010
Affected: Corporate 4.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in ghostscript:

Stack-based buffer overflow in the errprintf function in base/gsmisc.c
in ghostscript 8.64 through 8.70 allows remote attackers to cause a
denial of service (crash) and possibly execute arbitrary code via a
crafted PDF file, as originally reported for debug logging code in
gdevcups.c in the CUPS output driver (CVE-2009-4270).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4270
_______________________________________________________________________

Updated Packages:

Corporate 4.0:
6678d58a9fbaa84101ca4ac373720e4d corporate/4.0/i586/ghostscript-8.15-46.4.20060mlcs4.i586.rpm
9f43cdac3dea08e4cf9d60f852423b11 corporate/4.0/i586/ghostscript-common-8.15-46.4.20060mlcs4.i586.rpm
0fa2c2e58dd00e9bf040c1e4374534d9 corporate/4.0/i586/ghostscript-dvipdf-8.15-46.4.20060mlcs4.i586.rpm
8b9d1be9204240d6976909628c5bb540 corporate/4.0/i586/ghostscript-module-X-8.15-46.4.20060mlcs4.i586.rpm
28141332bfa7f600abf6d039532e8ac2 corporate/4.0/i586/ghostscript-X-8.15-46.4.20060mlcs4.i586.rpm
437b0369e2f73652718ca9ba256dd8f2 corporate/4.0/i586/libgs8-8.15-46.4.20060mlcs4.i586.rpm
bc5f1d8a48c96b526fbd6ad6359ca1e3 corporate/4.0/i586/libgs8-devel-8.15-46.4.20060mlcs4.i586.rpm
95e7106fab4913bf518811c4e5bb9dde corporate/4.0/i586/libijs1-0.35-46.4.20060mlcs4.i586.rpm
7c436687ba13dd887f020df9bf349751 corporate/4.0/i586/libijs1-devel-0.35-46.4.20060mlcs4.i586.rpm
8cb775bb21996923fdf7fcda83f8b875 corporate/4.0/SRPMS/ghostscript-8.15-46.4.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
885989f897cbdf06de4f162653aabf7c corporate/4.0/x86_64/ghostscript-8.15-46.4.20060mlcs4.x86_64.rpm
aebe81b69bac98a384ec372836f407e7 corporate/4.0/x86_64/ghostscript-common-8.15-46.4.20060mlcs4.x86_64.rpm
d1ebcf429948ce584862134b1cdce5b3 corporate/4.0/x86_64/ghostscript-dvipdf-8.15-46.4.20060mlcs4.x86_64.rpm
32a8d648d0bdd0112c6da2c0e88d7d7b corporate/4.0/x86_64/ghostscript-module-X-8.15-46.4.20060mlcs4.x86_64.rpm
53c9b945243254c7c0238a2f3424bae6 corporate/4.0/x86_64/ghostscript-X-8.15-46.4.20060mlcs4.x86_64.rpm
a4fb31d33215aede77de317d4a5af8cf corporate/4.0/x86_64/lib64gs8-8.15-46.4.20060mlcs4.x86_64.rpm
5a7b25aef9151d01dfeb17ab02e3f0ad corporate/4.0/x86_64/lib64gs8-devel-8.15-46.4.20060mlcs4.x86_64.rpm
30f3ea1e0c1d2596bf0134e39856afec corporate/4.0/x86_64/lib64ijs1-0.35-46.4.20060mlcs4.x86_64.rpm
a63f2d6d8347c2fc71b569db44b88508 corporate/4.0/x86_64/lib64ijs1-devel-0.35-46.4.20060mlcs4.x86_64.rpm
8cb775bb21996923fdf7fcda83f8b875 corporate/4.0/SRPMS/ghostscript-8.15-46.4.20060mlcs4.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFMP38UmqjQ0CJFipgRAl7cAKDLnMKvCBP49oS8bk4sLoqS+CE5SwCfXSy9
BhEOEhIMuCStqROHvbHKFTg=
=WHzR
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close