English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2010:135
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : ghostscript
 Date    : July 15, 2010
 Affected: Corporate 4.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability has been found and corrected in ghostscript:
 
 Stack-based buffer overflow in the errprintf function in base/gsmisc.c
 in ghostscript 8.64 through 8.70 allows remote attackers to cause a
 denial of service (crash) and possibly execute arbitrary code via a
 crafted PDF file, as originally reported for debug logging code in
 gdevcups.c in the CUPS output driver (CVE-2009-4270).
 
 The updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4270
 _______________________________________________________________________

 Updated Packages:

 Corporate 4.0:
 6678d58a9fbaa84101ca4ac373720e4d  corporate/4.0/i586/ghostscript-8.15-46.4.20060mlcs4.i586.rpm
 9f43cdac3dea08e4cf9d60f852423b11  corporate/4.0/i586/ghostscript-common-8.15-46.4.20060mlcs4.i586.rpm
 0fa2c2e58dd00e9bf040c1e4374534d9  corporate/4.0/i586/ghostscript-dvipdf-8.15-46.4.20060mlcs4.i586.rpm
 8b9d1be9204240d6976909628c5bb540  corporate/4.0/i586/ghostscript-module-X-8.15-46.4.20060mlcs4.i586.rpm
 28141332bfa7f600abf6d039532e8ac2  corporate/4.0/i586/ghostscript-X-8.15-46.4.20060mlcs4.i586.rpm
 437b0369e2f73652718ca9ba256dd8f2  corporate/4.0/i586/libgs8-8.15-46.4.20060mlcs4.i586.rpm
 bc5f1d8a48c96b526fbd6ad6359ca1e3  corporate/4.0/i586/libgs8-devel-8.15-46.4.20060mlcs4.i586.rpm
 95e7106fab4913bf518811c4e5bb9dde  corporate/4.0/i586/libijs1-0.35-46.4.20060mlcs4.i586.rpm
 7c436687ba13dd887f020df9bf349751  corporate/4.0/i586/libijs1-devel-0.35-46.4.20060mlcs4.i586.rpm 
 8cb775bb21996923fdf7fcda83f8b875  corporate/4.0/SRPMS/ghostscript-8.15-46.4.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 885989f897cbdf06de4f162653aabf7c  corporate/4.0/x86_64/ghostscript-8.15-46.4.20060mlcs4.x86_64.rpm
 aebe81b69bac98a384ec372836f407e7  corporate/4.0/x86_64/ghostscript-common-8.15-46.4.20060mlcs4.x86_64.rpm
 d1ebcf429948ce584862134b1cdce5b3  corporate/4.0/x86_64/ghostscript-dvipdf-8.15-46.4.20060mlcs4.x86_64.rpm
 32a8d648d0bdd0112c6da2c0e88d7d7b  corporate/4.0/x86_64/ghostscript-module-X-8.15-46.4.20060mlcs4.x86_64.rpm
 53c9b945243254c7c0238a2f3424bae6  corporate/4.0/x86_64/ghostscript-X-8.15-46.4.20060mlcs4.x86_64.rpm
 a4fb31d33215aede77de317d4a5af8cf  corporate/4.0/x86_64/lib64gs8-8.15-46.4.20060mlcs4.x86_64.rpm
 5a7b25aef9151d01dfeb17ab02e3f0ad  corporate/4.0/x86_64/lib64gs8-devel-8.15-46.4.20060mlcs4.x86_64.rpm
 30f3ea1e0c1d2596bf0134e39856afec  corporate/4.0/x86_64/lib64ijs1-0.35-46.4.20060mlcs4.x86_64.rpm
 a63f2d6d8347c2fc71b569db44b88508  corporate/4.0/x86_64/lib64ijs1-devel-0.35-46.4.20060mlcs4.x86_64.rpm 
 8cb775bb21996923fdf7fcda83f8b875  corporate/4.0/SRPMS/ghostscript-8.15-46.4.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFMP38UmqjQ0CJFipgRAl7cAKDLnMKvCBP49oS8bk4sLoqS+CE5SwCfXSy9
BhEOEhIMuCStqROHvbHKFTg=
=WHzR
-----END PGP SIGNATURE-----

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.