openSUSE Security Update : ghostscript-devel (openSUSE-SU-2010:0425-2)

high Nessus Plugin ID 48233

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

Specially crafted postscript (.ps) files could cause buffer overflows in ghostscript that could potentially be exploited to execute arbitrary code (CVE-2010-1628, CVE-2010-1869, CVE-2009-4270)

ghostscript by default read some initialization files from the current working directory. Local attackers could potentially exploit that to have other users execute arbitrary commands by placing such files e.g.
in /tmp (CVE-2010-2055).

Solution

Update the affected ghostscript-devel packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=559122

https://bugzilla.novell.com/show_bug.cgi?id=605043

https://bugzilla.novell.com/show_bug.cgi?id=608071

https://lists.opensuse.org/opensuse-updates/2010-08/msg00001.html

Plugin Details

Severity: High

ID: 48233

File Name: suse_11_1_ghostscript-devel-100712.nasl

Version: 1.8

Type: local

Agent: unix

Published: 8/3/2010

Updated: 1/14/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:ghostscript-x11, p-cpe:/a:novell:opensuse:ghostscript-library, p-cpe:/a:novell:opensuse:ghostscript-fonts-other, p-cpe:/a:novell:opensuse:ghostscript-fonts-std, p-cpe:/a:novell:opensuse:ghostscript-devel, cpe:/o:novell:opensuse:11.1, p-cpe:/a:novell:opensuse:libgimpprint-devel, p-cpe:/a:novell:opensuse:ghostscript-ijs-devel, p-cpe:/a:novell:opensuse:ghostscript-fonts-rus, p-cpe:/a:novell:opensuse:ghostscript-omni, p-cpe:/a:novell:opensuse:libgimpprint

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 7/12/2010

Reference Information

CVE: CVE-2009-4270, CVE-2009-4897, CVE-2010-1628, CVE-2010-1869, CVE-2010-2055

CWE: 119