Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2017.0133
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2017-0133)
Summary:The remote host is missing an update for the 'ghostscript, gutenprint, libspectre' package(s) announced via the MGASA-2017-0133 advisory.
Description:Summary:
The remote host is missing an update for the 'ghostscript, gutenprint, libspectre' package(s) announced via the MGASA-2017-0133 advisory.

Vulnerability Insight:
Various userparams in Ghostscript allow %pipe% in paths, allowing remote
shell command execution (CVE-2016-7976).

The .libfile function in Ghostscript doesn't check PermitFileReading
array, allowing remote file disclosure (CVE-2016-7977).

Reference leak in the .setdevice function in Ghostscript allows
use-after-free and remote code execution (CVE-2016-7978).

Type confusion in the .initialize_dsc_parser function in Ghostscript
allows remote code execution (CVE-2016-7979).

The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21
allows remote attackers to cause a denial of service (application crash)
or possibly execute arbitrary code via a crafted Postscript document
that calls .sethalftone5 with an empty operand stack (CVE-2016-8602).

A heap based buffer overflow was found in the ghostscript
jbig2_decode_gray_scale_image() function used to decode halftone segments
in a JBIG2 image. A document (PostScript or PDF) with an embedded,
specially crafted, jbig2 image could trigger a segmentation fault in
ghostscript (CVE-2016-9601).

The pdf14_open function in base/gdevp14.c in Ghostscript 9.20 allows
remote attackers to cause a denial of service (use-after-free and
application crash) via a crafted file that is mishandled in the color
management module (CVE-2016-10217).

The pdf14_pop_transparency_group function in base/gdevp14.c in the PDF
Transparency module in Ghostscript 9.20 allows remote attackers to cause
a denial of service (NULL pointer dereference and application crash) via
a crafted file (CVE-2016-10218).

The intersect function in base/gxfill.c in Ghostscript 9.20 allows
remote attackers to cause a denial of service (divide-by-zero error and
application crash) via a crafted file (CVE-2016-10219).

The gs_makewordimagedevice function in base/gsdevmem.c in Ghostscript
9.20 allows remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via a crafted file that is mishandled
in the PDF Transparency module (CVE-2016-10220).

The mem_get_bits_rectangle function in base/gdevmem.c in Ghostscript
9.20 allows remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via a crafted file (CVE-2017-5951).

The mem_get_bits_rectangle function in Ghostscript 9.20 allows remote
attackers to cause a denial of service (NULL pointer dereference) via a
crafted PostScript document (CVE-2017-7207).

Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command
execution via .rsdparams type confusion with a '/OutputFile (%pipe%'
substring in a crafted .eps document that is an input to the gs program
(CVE-2017-8291).

Affected Software/OS:
'ghostscript, gutenprint, libspectre' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-10217
Common Vulnerability Exposure (CVE) ID: CVE-2016-10218
Common Vulnerability Exposure (CVE) ID: CVE-2016-10219
Debian Security Information: DSA-3838 (Google Search)
http://www.debian.org/security/2017/dsa-3838
https://security.gentoo.org/glsa/201708-06
Common Vulnerability Exposure (CVE) ID: CVE-2016-10220
Common Vulnerability Exposure (CVE) ID: CVE-2016-7976
BugTraq ID: 95332
http://www.securityfocus.com/bid/95332
Debian Security Information: DSA-3691 (Google Search)
http://www.debian.org/security/2016/dsa-3691
https://security.gentoo.org/glsa/201702-31
http://www.openwall.com/lists/oss-security/2016/10/19/6
Common Vulnerability Exposure (CVE) ID: CVE-2016-7977
BugTraq ID: 95334
http://www.securityfocus.com/bid/95334
http://www.openwall.com/lists/oss-security/2016/09/29/28
http://www.openwall.com/lists/oss-security/2016/10/05/15
RedHat Security Advisories: RHSA-2017:0013
http://rhn.redhat.com/errata/RHSA-2017-0013.html
RedHat Security Advisories: RHSA-2017:0014
http://rhn.redhat.com/errata/RHSA-2017-0014.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-7978
BugTraq ID: 95336
http://www.securityfocus.com/bid/95336
Common Vulnerability Exposure (CVE) ID: CVE-2016-7979
BugTraq ID: 95337
http://www.securityfocus.com/bid/95337
Common Vulnerability Exposure (CVE) ID: CVE-2016-8602
BugTraq ID: 95311
http://www.securityfocus.com/bid/95311
http://www.openwall.com/lists/oss-security/2016/10/11/5
http://www.openwall.com/lists/oss-security/2016/10/11/7
Common Vulnerability Exposure (CVE) ID: CVE-2016-9601
BugTraq ID: 97095
http://www.securityfocus.com/bid/97095
Debian Security Information: DSA-3817 (Google Search)
https://www.debian.org/security/2017/dsa-3817
https://security.gentoo.org/glsa/201706-24
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9601
Common Vulnerability Exposure (CVE) ID: CVE-2017-5951
BugTraq ID: 98665
http://www.securityfocus.com/bid/98665
https://bugs.ghostscript.com/show_bug.cgi?id=697548
Common Vulnerability Exposure (CVE) ID: CVE-2017-7207
BugTraq ID: 96995
http://www.securityfocus.com/bid/96995
RedHat Security Advisories: RHSA-2017:2180
https://access.redhat.com/errata/RHSA-2017:2180
http://www.securitytracker.com/id/1039071
Common Vulnerability Exposure (CVE) ID: CVE-2017-8291
BugTraq ID: 98476
http://www.securityfocus.com/bid/98476
https://www.exploit-db.com/exploits/41955/
http://openwall.com/lists/oss-security/2017/04/28/2
https://bugs.ghostscript.com/show_bug.cgi?id=697808
https://bugzilla.redhat.com/show_bug.cgi?id=1446063
https://bugzilla.suse.com/show_bug.cgi?id=1036453
RedHat Security Advisories: RHSA-2017:1230
https://access.redhat.com/errata/RHSA-2017:1230
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.