Ghostscript GhostXPS is prone to a heap-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it into an insufficiently sized buffer.
An attacker can exploit this issue to cause denial-of-service condition. Due to the nature of this issue, code execution may be possible but this has not been confirmed.
Artifex Ghostscript GhostXPS 9.22 is vulnerable; other versions may also be affected.
Information
Debian Linux 6.0 s/390
Debian Linux 6.0 powerpc
Debian Linux 6.0 mips
Debian Linux 6.0 ia-64
Debian Linux 6.0 ia-32
Debian Linux 6.0 arm
Debian Linux 6.0 amd64
Artifex Ghostscript GhostXPS 9.22
Exploit
The researcher has created a proof-of-concept to demonstrate the issue. Please see the references for more information.
References:
- Bug 698063: Bounds check Ins_JMPR (Ghostscript)
- GhostXPS Homepage (Ghostscript)
- Bug 698063 - heap-buffer-overflow in Ins_JMPR(base/ttinterp.c) (Ghostscript)