This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Artifex First view 2017-03-21
Product Ghostscript Last view 2024-02-04
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:* 76
cpe:2.3:a:artifex:ghostscript:9.18:*:*:*:*:*:*:* 68
cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:* 68
cpe:2.3:a:artifex:ghostscript:9.07:*:*:*:*:*:*:* 68
cpe:2.3:a:artifex:ghostscript:-:*:*:*:*:*:*:* 68
cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:* 67
cpe:2.3:a:artifex:ghostscript:9.22:*:*:*:*:*:*:* 63
cpe:2.3:a:artifex:ghostscript:9.25:*:*:*:*:*:*:* 45
cpe:2.3:a:artifex:ghostscript:9.50:*:*:*:*:*:*:* 39
cpe:2.3:a:artifex:ghostscript:9.51:*:*:*:*:*:*:* 24
cpe:2.3:a:artifex:ghostscript:9.52:*:*:*:*:*:*:* 10
cpe:2.3:a:artifex:ghostscript:9.53.3:*:*:*:*:*:*:* 8
cpe:2.3:a:artifex:ghostscript:9.53.0:rc2:*:*:*:*:*:* 8
cpe:2.3:a:artifex:ghostscript:9.53.0:rc1:*:*:*:*:*:* 8
cpe:2.3:a:artifex:ghostscript:9.52.1:*:*:*:*:*:*:* 8
cpe:2.3:a:artifex:ghostscript:9.54.0:*:*:*:*:*:*:* 7
cpe:2.3:a:artifex:ghostscript:9.55.0:*:*:*:*:*:*:* 6

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
9.8 2024-02-04 CVE-2020-36773

Artifex Ghostscript before 9.53.0 has an out-of-bounds write and use-after-free in devices/vector/gdevtxtw.c (for txtwrite) because a single character code in a PDF document can map to more than one Unicode code point (e.g., for a ligature).

7.5 2023-12-06 CVE-2023-46751

An issue was discovered in the function gdev_prn_open_printer_seekable() in Artifex Ghostscript through 10.02.0 allows remote attackers to crash the application via a dangling pointer.

8.8 2023-09-18 CVE-2023-43115

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

5.5 2023-08-23 CVE-2023-4042

A flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostscript was not included in RHSA-2021:1852-06 advisory as it was claimed to be. This issue only affects the ghostscript package as shipped with Red Hat Enterprise Linux 8.

7.8 2023-08-22 CVE-2020-21890

Buffer Overflow vulnerability in clj_media_size function in devices/gdevclj.c in Artifex Ghostscript 9.50 allows remote attackers to cause a denial of service or other unspecified impact(s) via opening of crafted PDF document.

5.5 2023-08-22 CVE-2020-21710

A divide by zero issue discovered in eps_print_page in gdevepsn.c in Artifex Software GhostScript 9.50 allows remote attackers to cause a denial of service via opening of crafted PDF file.

5.5 2023-08-01 CVE-2023-38560

An integer overflow flaw was found in pcl/pl/plfont.c:418 in pl_glyph_name in ghostscript. This issue may allow a local attacker to cause a denial of service via transforming a crafted PCL file to PDF format.

5.5 2023-08-01 CVE-2023-38559

A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.

7.8 2023-06-25 CVE-2023-36664

Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).

9.8 2023-03-31 CVE-2023-28879

In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written.

7.1 2022-08-19 CVE-2020-27792

A heap-based buffer overwrite vulnerability was found in GhostScript's lp8000_print_page() function in the gdevlp8k.c file. This flaw allows an attacker to trick a user into opening a crafted PDF file, triggering the heap buffer overflow that could lead to memory corruption or a denial of service.

5.5 2022-06-16 CVE-2022-2085

A NULL pointer dereference vulnerability was found in Ghostscript, which occurs when it tries to render a large number of bits in memory. When allocating a buffer device, it relies on an init_device_procs defined for the device that uses it as a prototype that depends upon the number of bits per pixel. For bpp > 64, mem_x_device is used and does not have an init_device_procs defined. This flaw allows an attacker to parse a large number of bits (more than 64 bits per pixel), which triggers a NULL pointer dereference flaw, causing an application to crash.

7.8 2022-04-25 CVE-2019-25059

Artifex Ghostscript through 9.26 mishandles .completefont. NOTE: this issue exists because of an incomplete fix for CVE-2019-3839.

9.9 2022-02-16 CVE-2021-3781

A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

5.5 2022-01-01 CVE-2021-45949

Ghostscript GhostPDL 9.50 through 9.54.0 has a heap-based buffer overflow in sampled_data_finish (called from sampled_data_continue and interp).

5.5 2022-01-01 CVE-2021-45944

Ghostscript GhostPDL 9.50 through 9.53.3 has a use-after-free in sampled_data_sample (called from sampled_data_continue and interp).

5.5 2020-09-03 CVE-2020-14373

A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.

5.5 2020-08-13 CVE-2020-17538

A buffer overflow vulnerability in GetNumSameData() in contrib/lips4/gdevlips.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.

5.5 2020-08-13 CVE-2020-16310

A division by zero vulnerability in dot24_print_page() in devices/gdevdm24.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.

5.5 2020-08-13 CVE-2020-16309

A buffer overflow vulnerability in lxm5700m_print_page() in devices/gdevlxm.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted eps file. This is fixed in v9.51.

5.5 2020-08-13 CVE-2020-16308

A buffer overflow vulnerability in p_print_image() in devices/gdevcdj.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.

5.5 2020-08-13 CVE-2020-16307

A null pointer dereference vulnerability in devices/vector/gdevtxtw.c and psi/zbfont.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted postscript file. This is fixed in v9.51.

5.5 2020-08-13 CVE-2020-16306

A null pointer dereference vulnerability in devices/gdevtsep.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted postscript file. This is fixed in v9.51.

5.5 2020-08-13 CVE-2020-16305

A buffer overflow vulnerability in pcx_write_rle() in contrib/japanese/gdev10v.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.

5.5 2020-08-13 CVE-2020-16304

A buffer overflow vulnerability in image_render_color_thresh() in base/gxicolor.c of Artifex Software GhostScript v9.50 allows a remote attacker to escalate privileges via a crafted eps file. This is fixed in v9.51.

CWE : Common Weakness Enumeration

%idName
24% (20) CWE-787 Out-of-bounds Write
12% (10) CWE-704 Incorrect Type Conversion or Cast
10% (9) CWE-476 NULL Pointer Dereference
10% (9) CWE-416 Use After Free
7% (6) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
6% (5) CWE-200 Information Exposure
6% (5) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
4% (4) CWE-369 Divide By Zero
3% (3) CWE-190 Integer Overflow or Wraparound
3% (3) CWE-125 Out-of-bounds Read
2% (2) CWE-732 Incorrect Permission Assignment for Critical Resource
2% (2) CWE-20 Improper Input Validation
1% (1) CWE-209 Information Exposure Through an Error Message
1% (1) CWE-191 Integer Underflow (Wrap or Wraparound)
1% (1) CWE-184 Incomplete Blacklist
1% (1) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...

Snort® IPS/IDS

Date Description
2019-11-19 Ghostscript -dSAFER sandbox bypass attempt
RuleID : 51945 - Type : FILE-OTHER - Revision : 1
2019-03-05 Ghostscript PostScript remote code execution attempt
RuleID : 49086 - Type : FILE-OTHER - Revision : 1
2019-03-05 Ghostscript PostScript remote code execution attempt
RuleID : 49085 - Type : FILE-OTHER - Revision : 1
2018-10-25 Ghostscript -dSAFER sandbox bypass attempt
RuleID : 47882 - Type : FILE-OTHER - Revision : 1
2018-02-27 Ghostscript eqproc type confusion attempt
RuleID : 45536 - Type : FILE-OTHER - Revision : 2
2018-02-27 Ghostscript eqproc type confusion attempt
RuleID : 45535 - Type : FILE-OTHER - Revision : 2
2018-02-27 Ghostscript rsdparams type confusion attempt
RuleID : 45534 - Type : FILE-OTHER - Revision : 2
2018-02-27 Ghostscript rsdparams type confusion attempt
RuleID : 45533 - Type : FILE-OTHER - Revision : 2

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-08 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2019-1004.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-07083800ac.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-56221eb24b.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-81ee973d7c.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-8359498f3c.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-c39ae23dc8.nasl - Type: ACT_GATHER_INFO
2018-12-28 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1412.nasl - Type: ACT_GATHER_INFO
2018-12-28 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1430.nasl - Type: ACT_GATHER_INFO
2018-12-28 Name: The remote Debian host is missing a security update.
File: debian_DLA-1620.nasl - Type: ACT_GATHER_INFO
2018-12-21 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-1137.nasl - Type: ACT_GATHER_INFO
2018-12-19 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-3834.nasl - Type: ACT_GATHER_INFO
2018-12-14 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-3650.nasl - Type: ACT_GATHER_INFO
2018-12-14 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-3761.nasl - Type: ACT_GATHER_INFO
2018-12-10 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1404.nasl - Type: ACT_GATHER_INFO
2018-12-07 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-3760.nasl - Type: ACT_GATHER_INFO
2018-11-29 Name: The remote Debian host is missing a security update.
File: debian_DLA-1598.nasl - Type: ACT_GATHER_INFO
2018-11-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4346.nasl - Type: ACT_GATHER_INFO
2018-11-28 Name: The remote Windows host contains a library that is affected by multiple vulne...
File: ghostscript_9_26.nasl - Type: ACT_GATHER_INFO
2018-11-26 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201811-12.nasl - Type: ACT_GATHER_INFO
2018-11-21 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2018-2918.nasl - Type: ACT_GATHER_INFO
2018-11-13 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4336.nasl - Type: ACT_GATHER_INFO
2018-10-23 Name: The remote Debian host is missing a security update.
File: debian_DLA-1552.nasl - Type: ACT_GATHER_INFO
2018-10-16 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-2918.nasl - Type: ACT_GATHER_INFO
2018-10-11 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2018-1088.nasl - Type: ACT_GATHER_INFO
2018-10-01 Name: The remote Debian host is missing a security update.
File: debian_DLA-1527.nasl - Type: ACT_GATHER_INFO