Executive Summary

Titleghostscript security update
NameDSA-4346First vendor Publication2018-11-27
VendorDebianLast vendor Modification2018-11-27
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base ScoreN/AAttack RangeN/A
Cvss Impact ScoreN/AAttack ComplexityN/A
Cvss Expoit ScoreN/AAuthenticationN/A
Calculate full CVSS 2.0 Vectors scores


Several vulnerabilities were discovered in Ghostscript, the GPL PostScript/PDF interpreter, which may result in denial of service or the execution of arbitrary code if a malformed Postscript file is processed (despite the -dSAFER sandbox being enabled).

This update rebases ghostscript for stretch to the upstream version 9.26 which includes additional changes.

For the stable distribution (stretch), these problems have been fixed in version 9.26~dfsg-0+deb9u1.

We recommend that you upgrade your ghostscript packages.

For the detailed security status of ghostscript please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ghostscript

Original Source

Url : http://www.debian.org/security/2018/dsa-4346

Nessus® Vulnerability Scanner

2018-11-29Name : The remote Debian host is missing a security update.
File : debian_DLA-1598.nasl - Type : ACT_GATHER_INFO
2018-11-29Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4346.nasl - Type : ACT_GATHER_INFO
2018-11-28Name : The remote Windows host contains a library that is affected by multiple vulne...
File : ghostscript_9_26.nasl - Type : ACT_GATHER_INFO
2018-11-26Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201811-12.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
2018-11-28 00:21:56
  • First insertion