Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 410667 - <app-text/ghostscript-gpl-9.05 : "OutputFile" Buffer Overflow Vulnerability (CVE-2012-4875)
Summary: <app-text/ghostscript-gpl-9.05 : "OutputFile" Buffer Overflow Vulnerability (...
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL: https://secunia.com/advisories/47855/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2012-04-03 15:42 UTC by Agostino Sarubbo
Modified: 2012-09-08 15:51 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2012-04-03 15:42:22 UTC
From secunia security advisory at $URL:

Description
Andrei Costin has discovered a vulnerability in Ghostscript, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to a boundary error when processing the "OutputFile" device parameter and can be exploited to cause a heap-based buffer overflow via an overly long filename string in a PostScript document.

Successful exploitation may allow execution of arbitrary code.

The vulnerability is confirmed in version 9.04 running on Windows. Other versions may also be affected.


Solution
Update to version 9.05.
Comment 1 Agostino Sarubbo gentoo-dev 2012-04-03 15:44:50 UTC
@printing, is reproducible on Linux?
Comment 2 Andreas K. Hüttel archtester gentoo-dev 2012-05-18 21:07:25 UTC
Seems like only Secunia and the original reporter know how to trigger this. 

Ghostscript upstream closed the bug as invalid because they could not reproduce it and noone provided the required information even after poking.
Comment 3 Tim Sammut (RETIRED) gentoo-dev 2012-05-20 22:21:08 UTC
Thanks, everyone. I am resolving this as INVALID. Please reopen if we see updated or more complete information that indicates we're affected.
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2012-09-08 15:51:35 UTC
CVE-2012-4875 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4875):
  ** DISPUTED **  Heap-based buffer overflow in gdevwpr2.c in Ghostscript
  9.04, when processing the OutputFile device parameter, allows user-assisted
  remote attackers to execute arbitrary code via a long file name in a
  PostScript document.  NOTE: as of 20120314, the developer was not able to
  reproduce the issue and disputed it.