[Secure-testing-team] Bug#562643: CVE-2009-4270: Stack-based buffer overflow in the errprintf function

Giuseppe Iuculano iuculano at debian.org
Sat Dec 26 18:14:18 UTC 2009


Package: ghostscript
Version: 8.70~dfsg-2
Severity: grave
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for ghostscript.

CVE-2009-4270[0]:
| Stack-based buffer overflow in the errprintf function in base/gsmisc.c
| in ghostscript 8.64 through 8.70 allows remote attackers to cause a
| denial of service (crash) and possibly execute arbitrary code via a
| crafted PDF file, as originally reported for debug logging code in
| gdevcups.c in the CUPS output driver.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4270
    http://security-tracker.debian.org/tracker/CVE-2009-4270


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAks2UncACgkQNxpp46476aqmhQCfZqFp5DcZ+MCssaojRwCoOouL
ywAAnj1EEYZDyd25UqAL391PEpxUnHLR
=pecB
-----END PGP SIGNATURE-----





More information about the Secure-testing-team mailing list