Vulnerability Details : CVE-2009-0583
Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2009-0583
- cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.61:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.62:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.63:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.15.2:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.56:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.54:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:8.57:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:5.50:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:7.07:*:*:*:*:*:*:*
- cpe:2.3:a:ghostscript:ghostscript:7.05:*:*:*:*:*:*:*
- cpe:2.3:a:argyllcms:argyllcms:*:*:*:*:*:*:*:*
- cpe:2.3:a:argyllcms:argyllcms:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:argyllcms:argyllcms:0.7.0:beta_8:*:*:*:*:*:*
- cpe:2.3:a:argyllcms:argyllcms:0.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:argyllcms:argyllcms:0.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:argyllcms:argyllcms:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:argyllcms:argyllcms:0.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:argyllcms:argyllcms:0.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:argyllcms:argyllcms:0.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:argyllcms:argyllcms:0.1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-0583
0.93%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-0583
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2009-0583
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-0583
-
http://www.redhat.com/support/errata/RHSA-2009-0345.html
SupportVendor Advisory
-
http://www.auscert.org.au/render.html?it=10666
US Government Resource
-
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2009:007 - openSUSE Security Announce - openSUSE Mailing Lists
-
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00772.html
[SECURITY] Fedora 10 Update: ghostscript-8.63-5.fc10Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/49329
Ghostscript icclib native color buffer overflow CVE-2009-0583 Vulnerability Report
-
http://www.vupen.com/english/advisories/2009/0776
Site en constructionVendor Advisory
-
http://www.debian.org/security/2009/dsa-1746
[SECURITY] [DSA 1746-1] New ghostscript packages fix arbitrary code executionVendor Advisory
-
http://support.avaya.com/elmodocs2/security/ASA-2009-098.htm
ASA-2009-098 (RHSA-2009-0345)
-
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00887.html
[SECURITY] Fedora 10 Update: argyllcms-1.0.3-3.fc10
-
http://www.securityfocus.com/bid/34184
-
http://www.gentoo.org/security/en/glsa/glsa-200903-37.xml
Ghostscript: User-assisted execution of arbitrary code (GLSA 200903-37) — Gentoo security
-
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00916.html
[SECURITY] Fedora 9 Update: argyllcms-1.0.3-3.fc9
-
http://www.vupen.com/english/advisories/2009/1708
Site en construction
-
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00770.html
[SECURITY] Fedora 9 Update: ghostscript-8.63-2.fc9Vendor Advisory
-
https://usn.ubuntu.com/757-1/
404: Page not found | Ubuntu
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1
-
http://www.vupen.com/english/advisories/2009/0816
Site en constructionVendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2009:096
Mandriva
-
https://issues.rpath.com/browse/RPL-2991
-
http://www.securityfocus.com/archive/1/501994/100/0/threaded
-
http://securitytracker.com/id?1021868
Access Denied
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10795
404 Not Found
-
http://bugs.gentoo.org/show_bug.cgi?id=261087
261087 – (CVE-2009-0583) app-text/ghostscript-* ICC Library integer overflows (CVE-2009-0583,CVE-2009-0584)
-
https://bugzilla.redhat.com/show_bug.cgi?id=487742
487742 – (CVE-2009-0583) CVE-2009-0583 ghostscript, argyllcms: Multiple integer overflows in the International Color Consortium Format LibraryVendor Advisory
-
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0050
Vendor Advisory
-
http://www.vupen.com/english/advisories/2009/0777
Site en constructionVendor Advisory
-
http://www.ubuntu.com/usn/USN-743-1
USN-743-1: Ghostscript vulnerabilities | Ubuntu security notices | Ubuntu
-
http://www.mandriva.com/security/advisories?name=MDVSA-2009:095
Mandriva
Jump to