Description
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1510-1 | New ghostscript packages fix arbitrary code execution |
Ubuntu USN |
USN-599-1 | Ghostscript vulnerability |
References
History
No history.
Subscriptions
Debian
Subscribe
Debian Linux
Subscribe
Ghostscript
Subscribe
Ghostscript
Subscribe
Mandrakesoft
Subscribe
Mandrake Linux
Subscribe
Mandrake Linux Corporate Server
Subscribe
Mandrakesoft Corporate Server
Subscribe
Redhat
Subscribe
Desktop
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Desktop Workstation
Subscribe
Rpath
Subscribe
Rpath Linux
Subscribe
Suse
Subscribe
Novell Linux Pos
Subscribe
Open Suse
Subscribe
Suse Linux
Subscribe
Suse Open Enterprise Server
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T07:46:54.069Z
Reserved: 2008-01-23T00:00:00.000Z
Link: CVE-2008-0411
No data.
Status : Deferred
Published: 2008-02-28T21:44:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-0411
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN