In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3381-1 | ghostscript security update |
Debian DSA |
DSA-5383-1 | ghostscript security update |
Ubuntu USN |
USN-6017-1 | Ghostscript vulnerability |
Ubuntu USN |
USN-6017-2 | Ghostscript vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 14 Feb 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-14T19:29:52.451Z
Reserved: 2023-03-27T00:00:00.000Z
Link: CVE-2023-28879
Updated: 2024-08-02T13:51:38.670Z
Status : Modified
Published: 2023-03-31T17:15:06.697
Modified: 2025-02-14T20:15:33.373
Link: CVE-2023-28879
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN