![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.10.2017.0133 |
Categoría: | Mageia Linux Local Security Checks |
Título: | Mageia: Security Advisory (MGASA-2017-0133) |
Resumen: | The remote host is missing an update for the 'ghostscript, gutenprint, libspectre' package(s) announced via the MGASA-2017-0133 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'ghostscript, gutenprint, libspectre' package(s) announced via the MGASA-2017-0133 advisory. Vulnerability Insight: Various userparams in Ghostscript allow %pipe% in paths, allowing remote shell command execution (CVE-2016-7976). The .libfile function in Ghostscript doesn't check PermitFileReading array, allowing remote file disclosure (CVE-2016-7977). Reference leak in the .setdevice function in Ghostscript allows use-after-free and remote code execution (CVE-2016-7978). Type confusion in the .initialize_dsc_parser function in Ghostscript allows remote code execution (CVE-2016-7979). The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Postscript document that calls .sethalftone5 with an empty operand stack (CVE-2016-8602). A heap based buffer overflow was found in the ghostscript jbig2_decode_gray_scale_image() function used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript (CVE-2016-9601). The pdf14_open function in base/gdevp14.c in Ghostscript 9.20 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted file that is mishandled in the color management module (CVE-2016-10217). The pdf14_pop_transparency_group function in base/gdevp14.c in the PDF Transparency module in Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file (CVE-2016-10218). The intersect function in base/gxfill.c in Ghostscript 9.20 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file (CVE-2016-10219). The gs_makewordimagedevice function in base/gsdevmem.c in Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file that is mishandled in the PDF Transparency module (CVE-2016-10220). The mem_get_bits_rectangle function in base/gdevmem.c in Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file (CVE-2017-5951). The mem_get_bits_rectangle function in Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document (CVE-2017-7207). Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a '/OutputFile (%pipe%' substring in a crafted .eps document that is an input to the gs program (CVE-2017-8291). Affected Software/OS: 'ghostscript, gutenprint, libspectre' package(s) on Mageia 5. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-10217 Common Vulnerability Exposure (CVE) ID: CVE-2016-10218 Common Vulnerability Exposure (CVE) ID: CVE-2016-10219 Debian Security Information: DSA-3838 (Google Search) http://www.debian.org/security/2017/dsa-3838 https://security.gentoo.org/glsa/201708-06 Common Vulnerability Exposure (CVE) ID: CVE-2016-10220 Common Vulnerability Exposure (CVE) ID: CVE-2016-7976 BugTraq ID: 95332 http://www.securityfocus.com/bid/95332 Debian Security Information: DSA-3691 (Google Search) http://www.debian.org/security/2016/dsa-3691 https://security.gentoo.org/glsa/201702-31 http://www.openwall.com/lists/oss-security/2016/10/19/6 Common Vulnerability Exposure (CVE) ID: CVE-2016-7977 BugTraq ID: 95334 http://www.securityfocus.com/bid/95334 http://www.openwall.com/lists/oss-security/2016/09/29/28 http://www.openwall.com/lists/oss-security/2016/10/05/15 RedHat Security Advisories: RHSA-2017:0013 http://rhn.redhat.com/errata/RHSA-2017-0013.html RedHat Security Advisories: RHSA-2017:0014 http://rhn.redhat.com/errata/RHSA-2017-0014.html Common Vulnerability Exposure (CVE) ID: CVE-2016-7978 BugTraq ID: 95336 http://www.securityfocus.com/bid/95336 Common Vulnerability Exposure (CVE) ID: CVE-2016-7979 BugTraq ID: 95337 http://www.securityfocus.com/bid/95337 Common Vulnerability Exposure (CVE) ID: CVE-2016-8602 BugTraq ID: 95311 http://www.securityfocus.com/bid/95311 http://www.openwall.com/lists/oss-security/2016/10/11/5 http://www.openwall.com/lists/oss-security/2016/10/11/7 Common Vulnerability Exposure (CVE) ID: CVE-2016-9601 BugTraq ID: 97095 http://www.securityfocus.com/bid/97095 Debian Security Information: DSA-3817 (Google Search) https://www.debian.org/security/2017/dsa-3817 https://security.gentoo.org/glsa/201706-24 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9601 Common Vulnerability Exposure (CVE) ID: CVE-2017-5951 BugTraq ID: 98665 http://www.securityfocus.com/bid/98665 https://bugs.ghostscript.com/show_bug.cgi?id=697548 Common Vulnerability Exposure (CVE) ID: CVE-2017-7207 BugTraq ID: 96995 http://www.securityfocus.com/bid/96995 RedHat Security Advisories: RHSA-2017:2180 https://access.redhat.com/errata/RHSA-2017:2180 http://www.securitytracker.com/id/1039071 Common Vulnerability Exposure (CVE) ID: CVE-2017-8291 BugTraq ID: 98476 http://www.securityfocus.com/bid/98476 https://www.exploit-db.com/exploits/41955/ http://openwall.com/lists/oss-security/2017/04/28/2 https://bugs.ghostscript.com/show_bug.cgi?id=697808 https://bugzilla.redhat.com/show_bug.cgi?id=1446063 https://bugzilla.suse.com/show_bug.cgi?id=1036453 RedHat Security Advisories: RHSA-2017:1230 https://access.redhat.com/errata/RHSA-2017:1230 |
Copyright | Copyright (C) 2022 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |