Bug 493445 (CVE-2008-6679)
| Summary: | CVE-2008-6679 ghostscript: Buffer overflow in BaseFont writer module for pdfwrite device | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> | ||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
| Status: | CLOSED ERRATA | QA Contact: | |||||
| Severity: | medium | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | unspecified | CC: | bressers, twaugh | ||||
| Target Milestone: | --- | Keywords: | Security | ||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2010-12-23 22:50:40 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | 480775, 491857, 491858, 495915, 495916 | ||||||
| Bug Blocks: | |||||||
| Attachments: |
|
||||||
A buffer overflow flaw was found in Ghostscript's BaseFont writer module for pdfwrite device. An attacker could create a specially-crafted Postscript file which could cause ps2pdf to crash, or, potentially execute arbitrary code, when ps2pdf was used to convert it to equivalent PDF file. References: http://bugs.ghostscript.com/show_bug.cgi?id=690211 http://svn.ghostscript.com/viewvc?view=rev&sortby=rev&revision=9304 Common Vulnerabilities and Exposures assigned an identifier CVE-2008-6679 to the following vulnerability: Buffer overflow in the BaseFont writer module in Ghostscript 8.62, and possibly other versions, allows remote attackers to cause a denial of service (ps2pdf crash) and possibly execute arbitrary code via a crafted Postscript file. This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2009:0421 https://rhn.redhat.com/errata/RHSA-2009-0421.html ghostscript-8.63-3.fc9 has been submitted as an update for Fedora 9. http://admin.fedoraproject.org/updates/ghostscript-8.63-3.fc9 ghostscript-8.63-6.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report. ghostscript-8.63-3.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report. |
Created attachment 337627 [details] PoC proving presence of the flaw