Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.64.1005111923070.21091@faron.mitre.org>
Date: Tue, 11 May 2010 19:24:51 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
Subject: CVE assignment: ghostscript stack-based overflow


FYI.  The researcher told me that some distros were notified 
pre-disclosure, but I had already assigned this CVE when I found out.


======================================================
Name: CVE-2010-1869
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1869
Reference: MISC:http://www.checkpoint.com/defense/advisories/public/2010/cpai-10-May.html

Stack-based buffer overflow in the parser function in GhostScript 8.70
and 8.64 allows context-dependent attackers to execute arbitrary code
via a crafted PostScript file.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.