Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.63678
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1746-1)
Summary:The remote host is missing an update for the Debian 'ghostscript, gs-gpl' package(s) announced via the DSA-1746-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'ghostscript, gs-gpl' package(s) announced via the DSA-1746-1 advisory.

Vulnerability Insight:
Two security issues have been discovered in ghostscript, the GPL Ghostscript PostScript/PDF interpreter. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2009-0583

Jan Lieskovsky discovered multiple integer overflows in the ICC library, which allow the execution of arbitrary code via crafted ICC profiles in PostScript files with embedded images.

CVE-2009-0584

Jan Lieskovsky discovered insufficient upper-bounds checks on certain variable sizes in the ICC library, which allow the execution of arbitrary code via crafted ICC profiles in PostScript files with embedded images.

For the stable distribution (lenny), these problems have been fixed in version 8.62.dfsg.1-3.2lenny1.

For the oldstable distribution (etch), these problems have been fixed in version 8.54.dfsg.1-5etch2. Please note that the package in oldstable is called gs-gpl.

For the testing distribution (squeeze) and the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your ghostscript/gs-gpl packages.

Affected Software/OS:
'ghostscript, gs-gpl' package(s) on Debian 4, Debian 5.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-0583
1021868
http://securitytracker.com/id?1021868
20090319 rPSA-2009-0050-1 ghostscript
http://www.securityfocus.com/archive/1/501994/100/0/threaded
262288
http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1
34184
http://www.securityfocus.com/bid/34184
34266
http://secunia.com/advisories/34266
34373
http://secunia.com/advisories/34373
34381
http://secunia.com/advisories/34381
34393
http://secunia.com/advisories/34393
34398
http://secunia.com/advisories/34398
34418
http://secunia.com/advisories/34418
34437
http://secunia.com/advisories/34437
34443
http://secunia.com/advisories/34443
34469
http://secunia.com/advisories/34469
34729
http://secunia.com/advisories/34729
35559
http://secunia.com/advisories/35559
35569
http://secunia.com/advisories/35569
ADV-2009-0776
http://www.vupen.com/english/advisories/2009/0776
ADV-2009-0777
http://www.vupen.com/english/advisories/2009/0777
ADV-2009-0816
http://www.vupen.com/english/advisories/2009/0816
ADV-2009-1708
http://www.vupen.com/english/advisories/2009/1708
DSA-1746
http://www.debian.org/security/2009/dsa-1746
ESB-2009.0259
http://www.auscert.org.au/render.html?it=10666
FEDORA-2009-2883
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00770.html
FEDORA-2009-2885
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00772.html
FEDORA-2009-3011
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00887.html
FEDORA-2009-3031
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00916.html
GLSA-200903-37
http://www.gentoo.org/security/en/glsa/glsa-200903-37.xml
MDVSA-2009:095
http://www.mandriva.com/security/advisories?name=MDVSA-2009:095
MDVSA-2009:096
http://www.mandriva.com/security/advisories?name=MDVSA-2009:096
RHSA-2009:0345
http://www.redhat.com/support/errata/RHSA-2009-0345.html
SUSE-SR:2009:007
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
USN-743-1
http://www.ubuntu.com/usn/USN-743-1
USN-757-1
https://usn.ubuntu.com/757-1/
ghostscript-icclib-native-color-bo(49329)
https://exchange.xforce.ibmcloud.com/vulnerabilities/49329
http://bugs.gentoo.org/show_bug.cgi?id=261087
http://support.avaya.com/elmodocs2/security/ASA-2009-098.htm
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0050
https://bugzilla.redhat.com/show_bug.cgi?id=487742
https://issues.rpath.com/browse/RPL-2991
oval:org.mitre.oval:def:10795
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10795
Common Vulnerability Exposure (CVE) ID: CVE-2009-0584
52988
http://osvdb.org/52988
ghostscript-icclib-bo(49327)
https://exchange.xforce.ibmcloud.com/vulnerabilities/49327
https://bugzilla.redhat.com/show_bug.cgi?id=487744
oval:org.mitre.oval:def:10544
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10544
CopyrightCopyright (C) 2009 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.