CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
82.0%
icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
Vendor | Product | Version | CPE |
---|---|---|---|
argyllcms | cms | * | cpe:2.3:a:argyllcms:cms:*:*:*:*:*:*:*:* |
ghostscript | ghostscript | * | cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:* |
ghostscript | ghostscript | 0 | cpe:2.3:a:ghostscript:ghostscript:0:*:*:*:*:*:*:* |
ghostscript | ghostscript | 5.50 | cpe:2.3:a:ghostscript:ghostscript:5.50:*:*:*:*:*:*:* |
ghostscript | ghostscript | 7.05 | cpe:2.3:a:ghostscript:ghostscript:7.05:*:*:*:*:*:*:* |
ghostscript | ghostscript | 7.07 | cpe:2.3:a:ghostscript:ghostscript:7.07:*:*:*:*:*:*:* |
ghostscript | ghostscript | 8.0.1 | cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:* |
ghostscript | ghostscript | 8.15 | cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:* |
ghostscript | ghostscript | 8.15.2 | cpe:2.3:a:ghostscript:ghostscript:8.15.2:*:*:*:*:*:*:* |
ghostscript | ghostscript | 8.54 | cpe:2.3:a:ghostscript:ghostscript:8.54:*:*:*:*:*:*:* |
bugs.gentoo.org/show_bug.cgi?id=261087
lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
osvdb.org/52988
secunia.com/advisories/34266
secunia.com/advisories/34373
secunia.com/advisories/34381
secunia.com/advisories/34393
secunia.com/advisories/34398
secunia.com/advisories/34418
secunia.com/advisories/34437
secunia.com/advisories/34443
secunia.com/advisories/34469
secunia.com/advisories/34729
secunia.com/advisories/35559
secunia.com/advisories/35569
securitytracker.com/id?1021868
sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1
support.avaya.com/elmodocs2/security/ASA-2009-098.htm
wiki.rpath.com/wiki/Advisories:rPSA-2009-0050
www.auscert.org.au/render.html?it=10666
www.debian.org/security/2009/dsa-1746
www.gentoo.org/security/en/glsa/glsa-200903-37.xml
www.mandriva.com/security/advisories?name=MDVSA-2009:095
www.mandriva.com/security/advisories?name=MDVSA-2009:096
www.redhat.com/support/errata/RHSA-2009-0345.html
www.securityfocus.com/archive/1/501994/100/0/threaded
www.securityfocus.com/bid/34184
www.ubuntu.com/usn/USN-743-1
www.vupen.com/english/advisories/2009/0776
www.vupen.com/english/advisories/2009/0777
www.vupen.com/english/advisories/2009/0816
www.vupen.com/english/advisories/2009/1708
bugzilla.redhat.com/show_bug.cgi?id=487744
exchange.xforce.ibmcloud.com/vulnerabilities/49327
issues.rpath.com/browse/RPL-2991
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10544
usn.ubuntu.com/757-1/
www.redhat.com/archives/fedora-package-announce/2009-March/msg00770.html
www.redhat.com/archives/fedora-package-announce/2009-March/msg00772.html
www.redhat.com/archives/fedora-package-announce/2009-March/msg00887.html
www.redhat.com/archives/fedora-package-announce/2009-March/msg00916.html