Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2017.0133
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2017-0133)
Zusammenfassung:The remote host is missing an update for the 'ghostscript, gutenprint, libspectre' package(s) announced via the MGASA-2017-0133 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'ghostscript, gutenprint, libspectre' package(s) announced via the MGASA-2017-0133 advisory.

Vulnerability Insight:
Various userparams in Ghostscript allow %pipe% in paths, allowing remote
shell command execution (CVE-2016-7976).

The .libfile function in Ghostscript doesn't check PermitFileReading
array, allowing remote file disclosure (CVE-2016-7977).

Reference leak in the .setdevice function in Ghostscript allows
use-after-free and remote code execution (CVE-2016-7978).

Type confusion in the .initialize_dsc_parser function in Ghostscript
allows remote code execution (CVE-2016-7979).

The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21
allows remote attackers to cause a denial of service (application crash)
or possibly execute arbitrary code via a crafted Postscript document
that calls .sethalftone5 with an empty operand stack (CVE-2016-8602).

A heap based buffer overflow was found in the ghostscript
jbig2_decode_gray_scale_image() function used to decode halftone segments
in a JBIG2 image. A document (PostScript or PDF) with an embedded,
specially crafted, jbig2 image could trigger a segmentation fault in
ghostscript (CVE-2016-9601).

The pdf14_open function in base/gdevp14.c in Ghostscript 9.20 allows
remote attackers to cause a denial of service (use-after-free and
application crash) via a crafted file that is mishandled in the color
management module (CVE-2016-10217).

The pdf14_pop_transparency_group function in base/gdevp14.c in the PDF
Transparency module in Ghostscript 9.20 allows remote attackers to cause
a denial of service (NULL pointer dereference and application crash) via
a crafted file (CVE-2016-10218).

The intersect function in base/gxfill.c in Ghostscript 9.20 allows
remote attackers to cause a denial of service (divide-by-zero error and
application crash) via a crafted file (CVE-2016-10219).

The gs_makewordimagedevice function in base/gsdevmem.c in Ghostscript
9.20 allows remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via a crafted file that is mishandled
in the PDF Transparency module (CVE-2016-10220).

The mem_get_bits_rectangle function in base/gdevmem.c in Ghostscript
9.20 allows remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via a crafted file (CVE-2017-5951).

The mem_get_bits_rectangle function in Ghostscript 9.20 allows remote
attackers to cause a denial of service (NULL pointer dereference) via a
crafted PostScript document (CVE-2017-7207).

Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command
execution via .rsdparams type confusion with a '/OutputFile (%pipe%'
substring in a crafted .eps document that is an input to the gs program
(CVE-2017-8291).

Affected Software/OS:
'ghostscript, gutenprint, libspectre' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-10217
Common Vulnerability Exposure (CVE) ID: CVE-2016-10218
Common Vulnerability Exposure (CVE) ID: CVE-2016-10219
Debian Security Information: DSA-3838 (Google Search)
http://www.debian.org/security/2017/dsa-3838
https://security.gentoo.org/glsa/201708-06
Common Vulnerability Exposure (CVE) ID: CVE-2016-10220
Common Vulnerability Exposure (CVE) ID: CVE-2016-7976
BugTraq ID: 95332
http://www.securityfocus.com/bid/95332
Debian Security Information: DSA-3691 (Google Search)
http://www.debian.org/security/2016/dsa-3691
https://security.gentoo.org/glsa/201702-31
http://www.openwall.com/lists/oss-security/2016/10/19/6
Common Vulnerability Exposure (CVE) ID: CVE-2016-7977
BugTraq ID: 95334
http://www.securityfocus.com/bid/95334
http://www.openwall.com/lists/oss-security/2016/09/29/28
http://www.openwall.com/lists/oss-security/2016/10/05/15
RedHat Security Advisories: RHSA-2017:0013
http://rhn.redhat.com/errata/RHSA-2017-0013.html
RedHat Security Advisories: RHSA-2017:0014
http://rhn.redhat.com/errata/RHSA-2017-0014.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-7978
BugTraq ID: 95336
http://www.securityfocus.com/bid/95336
Common Vulnerability Exposure (CVE) ID: CVE-2016-7979
BugTraq ID: 95337
http://www.securityfocus.com/bid/95337
Common Vulnerability Exposure (CVE) ID: CVE-2016-8602
BugTraq ID: 95311
http://www.securityfocus.com/bid/95311
http://www.openwall.com/lists/oss-security/2016/10/11/5
http://www.openwall.com/lists/oss-security/2016/10/11/7
Common Vulnerability Exposure (CVE) ID: CVE-2016-9601
BugTraq ID: 97095
http://www.securityfocus.com/bid/97095
Debian Security Information: DSA-3817 (Google Search)
https://www.debian.org/security/2017/dsa-3817
https://security.gentoo.org/glsa/201706-24
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9601
Common Vulnerability Exposure (CVE) ID: CVE-2017-5951
BugTraq ID: 98665
http://www.securityfocus.com/bid/98665
https://bugs.ghostscript.com/show_bug.cgi?id=697548
Common Vulnerability Exposure (CVE) ID: CVE-2017-7207
BugTraq ID: 96995
http://www.securityfocus.com/bid/96995
RedHat Security Advisories: RHSA-2017:2180
https://access.redhat.com/errata/RHSA-2017:2180
http://www.securitytracker.com/id/1039071
Common Vulnerability Exposure (CVE) ID: CVE-2017-8291
BugTraq ID: 98476
http://www.securityfocus.com/bid/98476
https://www.exploit-db.com/exploits/41955/
http://openwall.com/lists/oss-security/2017/04/28/2
https://bugs.ghostscript.com/show_bug.cgi?id=697808
https://bugzilla.redhat.com/show_bug.cgi?id=1446063
https://bugzilla.suse.com/show_bug.cgi?id=1036453
RedHat Security Advisories: RHSA-2017:1230
https://access.redhat.com/errata/RHSA-2017:1230
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.