Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2008-0411
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 6.8/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:s-390:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:mandrakesoft:mandrake_linux:2007.0_x86_64:*:*:*:*: |
No
|
- | ||
cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:x86_64:*:*:*: |
No
|
- | ||
cpe:2.3:o:mandrakesoft:mandrake_linux:2008.0:*:x86_64:*:*:*: |
No
|
- | ||
cpe:2.3:o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:* |
No
|
- | ||
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:* |
No
|
- | ||
cpe:2.3:o:mandrakesoft:mandrakesoft_corporate_server:3.0_x86 |
No
|
- | ||
cpe:2.3:o:mandrakesoft:mandrakesoft_corporate_server:4.0_x86 |
No
|
- | ||
cpe:2.3:o:redhat:desktop:3.0:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:redhat:desktop:4.0:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:redhat:enterprise_linux:5:*:server:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:redhat:enterprise_linux:as_3:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:redhat:enterprise_linux:as_4:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:redhat:enterprise_linux:es_3:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:redhat:enterprise_linux:es_4:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:redhat:enterprise_linux:ws_3:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:redhat:enterprise_linux:ws_4:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:5:*:client:*:*:*:* |
No
|
- | ||
cpe:2.3:o:redhat:enterprise_linux_desktop_workstation:5:*:cl |
No
|
- | ||
cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:suse:novell_linux_pos:9:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:suse:open_suse:10.2:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:suse:open_suse:10.3:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:suse:suse_linux:10:sp1:enterprise_server:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:suse:suse_linux:10:sp1:enterprise_desktop:*:*:*:*: |
No
|
- | ||
cpe:2.3:o:suse:suse_linux:10.1:*:x86_64:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:suse:suse_linux:10.1:*:x86:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:suse:suse_linux:10.1:*:ppc:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:suse:suse_open_enterprise_server:0:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:s-390:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:* |
No
|
- | ||
cpe:2.3:a:ghostscript:ghostscript:0:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:* |
Yes
|
- |
References
- http://scary.beasts.org/security/CESA-2008-001.html
- http://www.debian.org/security/2008/dsa-1510
- http://www.redhat.com/support/errata/RHSA-2008-0155.html
- http://www.securityfocus.com/bid/28017
- https://issues.rpath.com/browse/RPL-2217
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:055
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00009.html
- http://secunia.com/advisories/29101
- http://secunia.com/advisories/29147
- http://secunia.com/advisories/29169
- http://wiki.rpath.com/Advisories:rPSA-2008-0082
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00085.html
- http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-securit
- http://www.securitytracker.com/id?1019511
- http://secunia.com/advisories/29103
- http://secunia.com/advisories/29112
- http://secunia.com/advisories/29135
- http://secunia.com/advisories/29196
- http://secunia.com/advisories/29154
- http://www.gentoo.org/security/en/glsa/glsa-200803-14.xml
- http://secunia.com/advisories/29314
- http://www.ubuntu.com/usn/usn-599-1
- http://secunia.com/advisories/29768
- http://www.vupen.com/english/advisories/2008/0693/references
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9
- http://www.securityfocus.com/archive/1/488946/100/0/threaded
- http://www.securityfocus.com/archive/1/488932/100/0/threaded