MEDIUM · 6.8

CVE-2008-0411

Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range...

Vulnerability Description

Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.

CVSS Score

6.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
DebianDebian Linux3.1
MandrakesoftMandrake Linux2007
MandrakesoftMandrake Linux Corporate Server3.0
MandrakesoftMandrakesoft Corporate Server3.0_x86_64
RedhatDesktop3.0
RedhatEnterprise Linux5
RedhatEnterprise Linux Desktop5
RedhatEnterprise Linux Desktop Workstation5
RpathRpath Linux1
SuseNovell Linux Pos9
SuseOpen Suse10.2
SuseSuse Linux9.0
SuseSuse Open Enterprise Server0
GhostscriptGhostscript<= 8.61

Related Weaknesses (CWE)

References

FAQ

What is CVE-2008-0411?

CVE-2008-0411 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range...

How severe is CVE-2008-0411?

CVE-2008-0411 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2008-0411?

Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Mandrakesoft Mandrake Linux, Mandrakesoft Mandrake Linux Corporate Server, Mandrakesoft Mandrakesoft Corporate Server, Redhat Desktop.