[Secure-testing-team] Bug#562643: CVE-2009-4270: Stack-based buffer overflow in the errprintf function
Giuseppe Iuculano
iuculano at debian.org
Sat Dec 26 18:14:18 UTC 2009
Package: ghostscript
Version: 8.70~dfsg-2
Severity: grave
Tags: security
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for ghostscript.
CVE-2009-4270[0]:
| Stack-based buffer overflow in the errprintf function in base/gsmisc.c
| in ghostscript 8.64 through 8.70 allows remote attackers to cause a
| denial of service (crash) and possibly execute arbitrary code via a
| crafted PDF file, as originally reported for debug logging code in
| gdevcups.c in the CUPS output driver.
If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4270
http://security-tracker.debian.org/tracker/CVE-2009-4270
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAks2UncACgkQNxpp46476aqmhQCfZqFp5DcZ+MCssaojRwCoOouL
ywAAnj1EEYZDyd25UqAL391PEpxUnHLR
=pecB
-----END PGP SIGNATURE-----
More information about the Secure-testing-team
mailing list