drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in Ghostscript
Name: |
Ausführen beliebiger Kommandos in Ghostscript |
|
ID: |
USN-1581-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 8.04 LTS, Ubuntu 10.04 LTS |
|
Datum: |
Mo, 24. September 2012, 18:34 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4405 |
|
Applikationen: |
AFPL Ghostscript |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============7726797933157936199== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig63BCDEEBA3354A058DA35B73"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig63BCDEEBA3354A058DA35B73 Content-Type: multipart/mixed; boundary="------------050908090801060505010306"
This is a multi-part message in MIME format. --------------050908090801060505010306 Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1581-1 September 24, 2012
ghostscript vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS - Ubuntu 8.04 LTS
Summary:
Ghostscript could be made to crash or run programs as your login if it opened a specially crafted file.
Software Description: - ghostscript: The GPL Ghostscript PostScript/PDF interpreter
Details:
Marc Schönefeld discovered that Ghostscript did not correctly handle certain image files. If a user or automated system were tricked into opening a specially crafted file, an attacker could cause a denial of service and possibly execute arbitrary code with user privileges.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04 LTS: libgs8 8.71.dfsg.1-0ubuntu5.5
Ubuntu 8.04 LTS: libgs8 8.61.dfsg.1-1ubuntu3.5
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1581-1 CVE-2012-4405
Package Information: https://launchpad.net/ubuntu/+source/ghostscript/8.71.dfsg.1-0ubuntu5.5 https://launchpad.net/ubuntu/+source/ghostscript/8.61.dfsg.1-1ubuntu3.5
--------------050908090801060505010306 Content-Type: text/plain; charset=UTF-8; name="Attached Message Part" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="Attached Message Part"
--------------050908090801060505010306--
--------------enig63BCDEEBA3354A058DA35B73 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
iQIcBAEBCgAGBQJQYHDaAAoJEGVp2FWnRL6TxioP/A8KsIHXfgWYCqNmNZE719gt MRg1s/rZ07tZYG8y0g9K2d/VzJxr0imBtXsPQwhvf1Z1Dk0QDp3+sq61DhVGaNhh Pb5PfQpTWjdfwyx+Ka+TDFDOvb2wM3ScgZHo9EMiZSBJ8URAEe8iEAFsDOdVlU3K 7o2v0pFHsca6fBtNMqL0g7I7YEbE6RwjtYtulOZPz6R5zQx2iic/JyC4BsOxvKbL gYSodbyn8PHcCbyFpc60BKMZGIBAD37htGteTMe0cRcEsSaMA8laUNLfghJjathN pcEIXQZlSU5aa7HXtqO7ATl54N6XHXbeVQC8rKaICdzs0X/5eHyawYsIcx4zsS6D OyKJAlMT5cexnQ+okC+yhv6pxpY6it0yMDp3Tj7GV08E/bIwcFZ/LpxCnkA69qO9 +3O0fCf6KAdCyv5OhSn2y0991vM4oWL3NaaQ7NeL2nzg6YJhEqdcU9HV3Co7580c 9zRTtEPFUjxqipsrAWKQBaIFvuepHGiUyc9xwKt7hBTE0jrh6ZKV39M0hIrO+yke cx/wIkSdAaLE/su35TfjbzrFT4/6GYz8J7zA/PW2WocRukkWHQePJmPOGJGWTYI/ 1nPxtEOznM2wBoxXdNV4FNdHQjwbt/+Y8eOUMXrUBB2bOFkikh/wMGPCTdI0KbLg PeiRvnmdbbfwYC18CAGj =XETK -----END PGP SIGNATURE-----
--------------enig63BCDEEBA3354A058DA35B73--
--===============7726797933157936199== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============7726797933157936199==--
|
|
|
|