ID CVE-2009-0792
Summary Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images. NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.
References
Vulnerable Configurations
  • cpe:2.3:a:ghostscript:ghostscript:7.07:*:*:*:*:*:*:*
    cpe:2.3:a:ghostscript:ghostscript:7.07:*:*:*:*:*:*:*
  • cpe:2.3:a:ghostscript:ghostscript:8.62:*:*:*:*:*:*:*
    cpe:2.3:a:ghostscript:ghostscript:8.62:*:*:*:*:*:*:*
  • cpe:2.3:a:ghostscript:ghostscript:8.57:*:*:*:*:*:*:*
    cpe:2.3:a:ghostscript:ghostscript:8.57:*:*:*:*:*:*:*
  • cpe:2.3:a:ghostscript:ghostscript:8.54:*:*:*:*:*:*:*
    cpe:2.3:a:ghostscript:ghostscript:8.54:*:*:*:*:*:*:*
  • cpe:2.3:a:ghostscript:ghostscript:7.05:*:*:*:*:*:*:*
    cpe:2.3:a:ghostscript:ghostscript:7.05:*:*:*:*:*:*:*
  • cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:*
    cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:*
  • cpe:2.3:a:ghostscript:ghostscript:5.50:*:*:*:*:*:*:*
    cpe:2.3:a:ghostscript:ghostscript:5.50:*:*:*:*:*:*:*
  • cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:*
    cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:*
  • cpe:2.3:a:ghostscript:ghostscript:8.56:*:*:*:*:*:*:*
    cpe:2.3:a:ghostscript:ghostscript:8.56:*:*:*:*:*:*:*
  • cpe:2.3:a:ghostscript:ghostscript:8.15.2:*:*:*:*:*:*:*
    cpe:2.3:a:ghostscript:ghostscript:8.15.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ghostscript:ghostscript:8.61:*:*:*:*:*:*:*
    cpe:2.3:a:ghostscript:ghostscript:8.61:*:*:*:*:*:*:*
  • cpe:2.3:a:ghostscript:ghostscript:8.63:*:*:*:*:*:*:*
    cpe:2.3:a:ghostscript:ghostscript:8.63:*:*:*:*:*:*:*
  • cpe:2.3:a:argyllcms:argyllcms:0.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:argyllcms:argyllcms:0.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:argyllcms:argyllcms:0.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:argyllcms:argyllcms:0.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:argyllcms:argyllcms:0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:argyllcms:argyllcms:0.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:argyllcms:argyllcms:0.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:argyllcms:argyllcms:0.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:argyllcms:argyllcms:0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:argyllcms:argyllcms:0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:argyllcms:argyllcms:0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:argyllcms:argyllcms:0.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:argyllcms:argyllcms:0.7.0:beta_8:*:*:*:*:*:*
    cpe:2.3:a:argyllcms:argyllcms:0.7.0:beta_8:*:*:*:*:*:*
  • cpe:2.3:a:argyllcms:argyllcms:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:argyllcms:argyllcms:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:argyllcms:argyllcms:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:argyllcms:argyllcms:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:argyllcms:argyllcms:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:argyllcms:argyllcms:1.0.3:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 13-02-2023 - 01:17)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
oval via4
accepted 2013-04-29T04:12:20.992-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description of an incomplete fix for CVE-2009-0583.
family unix
id oval:org.mitre.oval:def:11207
status accepted
submitted 2010-07-09T03:56:16-04:00
title fix for CVE-2009-0583.
version 30
redhat via4
advisories
  • bugzilla
    id 493442
    title CVE-2007-6725 ghostscript: DoS (crash) in CCITTFax decoding filter
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 4 is installed
        oval oval:com.redhat.rhba:tst:20070304025
      • OR
        • AND
          • comment ghostscript is earlier than 0:7.07-33.2.el4_7.8
            oval oval:com.redhat.rhsa:tst:20090420001
          • comment ghostscript is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20080155002
        • AND
          • comment ghostscript-devel is earlier than 0:7.07-33.2.el4_7.8
            oval oval:com.redhat.rhsa:tst:20090420003
          • comment ghostscript-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20080155004
        • AND
          • comment ghostscript-gtk is earlier than 0:7.07-33.2.el4_7.8
            oval oval:com.redhat.rhsa:tst:20090420005
          • comment ghostscript-gtk is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20080155006
    rhsa
    id RHSA-2009:0420
    released 2009-04-14
    severity Moderate
    title RHSA-2009:0420: ghostscript security update (Moderate)
  • bugzilla
    id 493445
    title CVE-2008-6679 ghostscript: Buffer overflow in BaseFont writer module for pdfwrite device
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • comment ghostscript is earlier than 0:8.15.2-9.4.el5_3.7
            oval oval:com.redhat.rhsa:tst:20090421001
          • comment ghostscript is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080155009
        • AND
          • comment ghostscript-devel is earlier than 0:8.15.2-9.4.el5_3.7
            oval oval:com.redhat.rhsa:tst:20090421003
          • comment ghostscript-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080155011
        • AND
          • comment ghostscript-gtk is earlier than 0:8.15.2-9.4.el5_3.7
            oval oval:com.redhat.rhsa:tst:20090421005
          • comment ghostscript-gtk is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080155013
    rhsa
    id RHSA-2009:0421
    released 2009-04-14
    severity Moderate
    title RHSA-2009:0421: ghostscript security update (Moderate)
rpms
  • ghostscript-0:7.05-32.1.20
  • ghostscript-0:7.07-33.2.el4_7.8
  • ghostscript-debuginfo-0:7.05-32.1.20
  • ghostscript-debuginfo-0:7.07-33.2.el4_7.8
  • ghostscript-devel-0:7.05-32.1.20
  • ghostscript-devel-0:7.07-33.2.el4_7.8
  • ghostscript-gtk-0:7.07-33.2.el4_7.8
  • hpijs-0:1.3-32.1.20
  • ghostscript-0:8.15.2-9.4.el5_3.7
  • ghostscript-debuginfo-0:8.15.2-9.4.el5_3.7
  • ghostscript-devel-0:8.15.2-9.4.el5_3.7
  • ghostscript-gtk-0:8.15.2-9.4.el5_3.7
refmap via4
bugtraq 20090417 rPSA-2009-0060-1 ghostscript
confirm
fedora
  • FEDORA-2009-3430
  • FEDORA-2009-3435
  • FEDORA-2009-3709
  • FEDORA-2009-3710
gentoo GLSA-201412-17
mandriva
  • MDVSA-2009:095
  • MDVSA-2009:096
secunia
  • 34373
  • 34667
  • 34711
  • 34726
  • 34729
  • 34732
  • 35416
  • 35559
  • 35569
sunalert 262288
suse
  • SUSE-SR:2009:009
  • SUSE-SR:2009:011
ubuntu USN-757-1
vupen ADV-2009-1708
xf ghostscript-icc-bo(50381)
Last major update 13-02-2023 - 01:17
Published 14-04-2009 - 16:26
Last modified 13-02-2023 - 01:17
Back to Top