Ghostscript GhostXPS is prone to a heap-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it into an insufficiently sized buffer.
An attacker can exploit this issue to cause denial-of-service condition. Due to the nature of this issue, code execution may be possible but this has not been confirmed.
Artifex Ghostscript GhostXPS 9.22 is vulnerable; other versions may also be affected.
Information
Debian Linux 6.0 s/390
Debian Linux 6.0 powerpc
Debian Linux 6.0 mips
Debian Linux 6.0 ia-64
Debian Linux 6.0 ia-32
Debian Linux 6.0 arm
Debian Linux 6.0 amd64
Artifex Ghostscript GhostXPS 9.22
Exploit
The researcher has created a proof-of-concept to demonstrate the issue. Please see the references for more information.
References:
- Bug 698026: bounds check zone pointers in Ins_IP() (Ghostscript)
- GhostXPS Homepage (Ghostscript)
- Bug 698026 - heap-use-after-free in Ins_IP(base/ttinterp.c) (Ghostscript)