![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.10.2017.0133 |
Category: | Mageia Linux Local Security Checks |
Title: | Mageia: Security Advisory (MGASA-2017-0133) |
Summary: | The remote host is missing an update for the 'ghostscript, gutenprint, libspectre' package(s) announced via the MGASA-2017-0133 advisory. |
Description: | Summary: The remote host is missing an update for the 'ghostscript, gutenprint, libspectre' package(s) announced via the MGASA-2017-0133 advisory. Vulnerability Insight: Various userparams in Ghostscript allow %pipe% in paths, allowing remote shell command execution (CVE-2016-7976). The .libfile function in Ghostscript doesn't check PermitFileReading array, allowing remote file disclosure (CVE-2016-7977). Reference leak in the .setdevice function in Ghostscript allows use-after-free and remote code execution (CVE-2016-7978). Type confusion in the .initialize_dsc_parser function in Ghostscript allows remote code execution (CVE-2016-7979). The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Postscript document that calls .sethalftone5 with an empty operand stack (CVE-2016-8602). A heap based buffer overflow was found in the ghostscript jbig2_decode_gray_scale_image() function used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript (CVE-2016-9601). The pdf14_open function in base/gdevp14.c in Ghostscript 9.20 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted file that is mishandled in the color management module (CVE-2016-10217). The pdf14_pop_transparency_group function in base/gdevp14.c in the PDF Transparency module in Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file (CVE-2016-10218). The intersect function in base/gxfill.c in Ghostscript 9.20 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file (CVE-2016-10219). The gs_makewordimagedevice function in base/gsdevmem.c in Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file that is mishandled in the PDF Transparency module (CVE-2016-10220). The mem_get_bits_rectangle function in base/gdevmem.c in Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file (CVE-2017-5951). The mem_get_bits_rectangle function in Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document (CVE-2017-7207). Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a '/OutputFile (%pipe%' substring in a crafted .eps document that is an input to the gs program (CVE-2017-8291). Affected Software/OS: 'ghostscript, gutenprint, libspectre' package(s) on Mageia 5. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-10217 Common Vulnerability Exposure (CVE) ID: CVE-2016-10218 Common Vulnerability Exposure (CVE) ID: CVE-2016-10219 Debian Security Information: DSA-3838 (Google Search) http://www.debian.org/security/2017/dsa-3838 https://security.gentoo.org/glsa/201708-06 Common Vulnerability Exposure (CVE) ID: CVE-2016-10220 Common Vulnerability Exposure (CVE) ID: CVE-2016-7976 BugTraq ID: 95332 http://www.securityfocus.com/bid/95332 Debian Security Information: DSA-3691 (Google Search) http://www.debian.org/security/2016/dsa-3691 https://security.gentoo.org/glsa/201702-31 http://www.openwall.com/lists/oss-security/2016/10/19/6 Common Vulnerability Exposure (CVE) ID: CVE-2016-7977 BugTraq ID: 95334 http://www.securityfocus.com/bid/95334 http://www.openwall.com/lists/oss-security/2016/09/29/28 http://www.openwall.com/lists/oss-security/2016/10/05/15 RedHat Security Advisories: RHSA-2017:0013 http://rhn.redhat.com/errata/RHSA-2017-0013.html RedHat Security Advisories: RHSA-2017:0014 http://rhn.redhat.com/errata/RHSA-2017-0014.html Common Vulnerability Exposure (CVE) ID: CVE-2016-7978 BugTraq ID: 95336 http://www.securityfocus.com/bid/95336 Common Vulnerability Exposure (CVE) ID: CVE-2016-7979 BugTraq ID: 95337 http://www.securityfocus.com/bid/95337 Common Vulnerability Exposure (CVE) ID: CVE-2016-8602 BugTraq ID: 95311 http://www.securityfocus.com/bid/95311 http://www.openwall.com/lists/oss-security/2016/10/11/5 http://www.openwall.com/lists/oss-security/2016/10/11/7 Common Vulnerability Exposure (CVE) ID: CVE-2016-9601 BugTraq ID: 97095 http://www.securityfocus.com/bid/97095 Debian Security Information: DSA-3817 (Google Search) https://www.debian.org/security/2017/dsa-3817 https://security.gentoo.org/glsa/201706-24 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9601 Common Vulnerability Exposure (CVE) ID: CVE-2017-5951 BugTraq ID: 98665 http://www.securityfocus.com/bid/98665 https://bugs.ghostscript.com/show_bug.cgi?id=697548 Common Vulnerability Exposure (CVE) ID: CVE-2017-7207 BugTraq ID: 96995 http://www.securityfocus.com/bid/96995 RedHat Security Advisories: RHSA-2017:2180 https://access.redhat.com/errata/RHSA-2017:2180 http://www.securitytracker.com/id/1039071 Common Vulnerability Exposure (CVE) ID: CVE-2017-8291 BugTraq ID: 98476 http://www.securityfocus.com/bid/98476 https://www.exploit-db.com/exploits/41955/ http://openwall.com/lists/oss-security/2017/04/28/2 https://bugs.ghostscript.com/show_bug.cgi?id=697808 https://bugzilla.redhat.com/show_bug.cgi?id=1446063 https://bugzilla.suse.com/show_bug.cgi?id=1036453 RedHat Security Advisories: RHSA-2017:1230 https://access.redhat.com/errata/RHSA-2017:1230 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |