Giuseppe Iuculano
2009-Dec-26 18:14 UTC
[Secure-testing-team] Bug#562643: CVE-2009-4270: Stack-based buffer overflow in the errprintf function
Package: ghostscript Version: 8.70~dfsg-2 Severity: grave Tags: security -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for ghostscript. CVE-2009-4270[0]: | Stack-based buffer overflow in the errprintf function in base/gsmisc.c | in ghostscript 8.64 through 8.70 allows remote attackers to cause a | denial of service (crash) and possibly execute arbitrary code via a | crafted PDF file, as originally reported for debug logging code in | gdevcups.c in the CUPS output driver. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4270 http://security-tracker.debian.org/tracker/CVE-2009-4270 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAks2UncACgkQNxpp46476aqmhQCfZqFp5DcZ+MCssaojRwCoOouL ywAAnj1EEYZDyd25UqAL391PEpxUnHLR =pecB -----END PGP SIGNATURE-----