![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.10.2017.0133 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2017-0133) |
Zusammenfassung: | The remote host is missing an update for the 'ghostscript, gutenprint, libspectre' package(s) announced via the MGASA-2017-0133 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'ghostscript, gutenprint, libspectre' package(s) announced via the MGASA-2017-0133 advisory. Vulnerability Insight: Various userparams in Ghostscript allow %pipe% in paths, allowing remote shell command execution (CVE-2016-7976). The .libfile function in Ghostscript doesn't check PermitFileReading array, allowing remote file disclosure (CVE-2016-7977). Reference leak in the .setdevice function in Ghostscript allows use-after-free and remote code execution (CVE-2016-7978). Type confusion in the .initialize_dsc_parser function in Ghostscript allows remote code execution (CVE-2016-7979). The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Postscript document that calls .sethalftone5 with an empty operand stack (CVE-2016-8602). A heap based buffer overflow was found in the ghostscript jbig2_decode_gray_scale_image() function used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript (CVE-2016-9601). The pdf14_open function in base/gdevp14.c in Ghostscript 9.20 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted file that is mishandled in the color management module (CVE-2016-10217). The pdf14_pop_transparency_group function in base/gdevp14.c in the PDF Transparency module in Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file (CVE-2016-10218). The intersect function in base/gxfill.c in Ghostscript 9.20 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file (CVE-2016-10219). The gs_makewordimagedevice function in base/gsdevmem.c in Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file that is mishandled in the PDF Transparency module (CVE-2016-10220). The mem_get_bits_rectangle function in base/gdevmem.c in Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file (CVE-2017-5951). The mem_get_bits_rectangle function in Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document (CVE-2017-7207). Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a '/OutputFile (%pipe%' substring in a crafted .eps document that is an input to the gs program (CVE-2017-8291). Affected Software/OS: 'ghostscript, gutenprint, libspectre' package(s) on Mageia 5. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-10217 Common Vulnerability Exposure (CVE) ID: CVE-2016-10218 Common Vulnerability Exposure (CVE) ID: CVE-2016-10219 Debian Security Information: DSA-3838 (Google Search) http://www.debian.org/security/2017/dsa-3838 https://security.gentoo.org/glsa/201708-06 Common Vulnerability Exposure (CVE) ID: CVE-2016-10220 Common Vulnerability Exposure (CVE) ID: CVE-2016-7976 BugTraq ID: 95332 http://www.securityfocus.com/bid/95332 Debian Security Information: DSA-3691 (Google Search) http://www.debian.org/security/2016/dsa-3691 https://security.gentoo.org/glsa/201702-31 http://www.openwall.com/lists/oss-security/2016/10/19/6 Common Vulnerability Exposure (CVE) ID: CVE-2016-7977 BugTraq ID: 95334 http://www.securityfocus.com/bid/95334 http://www.openwall.com/lists/oss-security/2016/09/29/28 http://www.openwall.com/lists/oss-security/2016/10/05/15 RedHat Security Advisories: RHSA-2017:0013 http://rhn.redhat.com/errata/RHSA-2017-0013.html RedHat Security Advisories: RHSA-2017:0014 http://rhn.redhat.com/errata/RHSA-2017-0014.html Common Vulnerability Exposure (CVE) ID: CVE-2016-7978 BugTraq ID: 95336 http://www.securityfocus.com/bid/95336 Common Vulnerability Exposure (CVE) ID: CVE-2016-7979 BugTraq ID: 95337 http://www.securityfocus.com/bid/95337 Common Vulnerability Exposure (CVE) ID: CVE-2016-8602 BugTraq ID: 95311 http://www.securityfocus.com/bid/95311 http://www.openwall.com/lists/oss-security/2016/10/11/5 http://www.openwall.com/lists/oss-security/2016/10/11/7 Common Vulnerability Exposure (CVE) ID: CVE-2016-9601 BugTraq ID: 97095 http://www.securityfocus.com/bid/97095 Debian Security Information: DSA-3817 (Google Search) https://www.debian.org/security/2017/dsa-3817 https://security.gentoo.org/glsa/201706-24 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9601 Common Vulnerability Exposure (CVE) ID: CVE-2017-5951 BugTraq ID: 98665 http://www.securityfocus.com/bid/98665 https://bugs.ghostscript.com/show_bug.cgi?id=697548 Common Vulnerability Exposure (CVE) ID: CVE-2017-7207 BugTraq ID: 96995 http://www.securityfocus.com/bid/96995 RedHat Security Advisories: RHSA-2017:2180 https://access.redhat.com/errata/RHSA-2017:2180 http://www.securitytracker.com/id/1039071 Common Vulnerability Exposure (CVE) ID: CVE-2017-8291 BugTraq ID: 98476 http://www.securityfocus.com/bid/98476 https://www.exploit-db.com/exploits/41955/ http://openwall.com/lists/oss-security/2017/04/28/2 https://bugs.ghostscript.com/show_bug.cgi?id=697808 https://bugzilla.redhat.com/show_bug.cgi?id=1446063 https://bugzilla.suse.com/show_bug.cgi?id=1036453 RedHat Security Advisories: RHSA-2017:1230 https://access.redhat.com/errata/RHSA-2017:1230 |
Copyright | Copyright (C) 2022 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |