SB2017040312 - Multiple vulnerabilities in Ghostscript
Published: April 3, 2017 Updated: September 27, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2016-7976)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The PS Interpreter in Ghostscript 9.18 and 9.20 allows remote attackers to execute arbitrary code via crafted userparams.
2) Use-after-free (CVE-ID: CVE-2016-7978)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Use-after-free vulnerability in Ghostscript 9.20 might allow remote attackers to execute arbitrary code via vectors related to a reference leak in .setdevice.
3) Use-after-free (CVE-ID: CVE-2016-10217)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing a crafted file that is mishandled in the color management module. A remote attackers can cause a denial of service (use-after-free and application crash).
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
4) NULL pointer dereference (CVE-ID: CVE-2016-10218)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a crafted file.
Remediation
Install update from vendor's website.
References
- http://git.ghostscript.com/?p=user/chrisl/ghostpdl.git;a=commit;h=6d444c273da5499a4cd72f21cb6d4c9a5256807d
- http://www.debian.org/security/2016/dsa-3691
- http://www.openwall.com/lists/oss-security/2016/10/19/6
- http://www.securityfocus.com/bid/95332
- https://bugs.ghostscript.com/show_bug.cgi?id=697178
- https://security.gentoo.org/glsa/201702-31
- http://rhn.redhat.com/errata/RHSA-2017-0013.html
- http://www.openwall.com/lists/oss-security/2016/10/05/15
- http://www.securityfocus.com/bid/95336
- https://bugs.ghostscript.com/show_bug.cgi?id=697179
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=90fd0c7ca3efc1ddff64a86f4104b13b3ac969eb
- https://bugs.ghostscript.com/show_bug.cgi?id=697456
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d621292fb2c8157d9899dcd83fd04dd250e30fe4
- https://bugs.ghostscript.com/show_bug.cgi?id=697444