CVE-2010-2055

Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583183
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583316
http://bugs.ghostscript.com/show_bug.cgi?id=691339 Exploit
http://bugs.ghostscript.com/show_bug.cgi?id=691350
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043913.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043948.html
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://savannah.gnu.org/forum/forum.php?forum_id=6368
http://secunia.com/advisories/40452 Vendor Advisory
http://secunia.com/advisories/40475 Vendor Advisory
http://secunia.com/advisories/40532 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201412-17.xml
http://www.osvdb.org/66247
http://www.securityfocus.com/archive/1/511433
http://www.securityfocus.com/archive/1/511472 Exploit
http://www.securityfocus.com/archive/1/511474 Exploit
http://www.securityfocus.com/archive/1/511476
http://www.vupen.com/english/advisories/2010/1757 Vendor Advisory
https://bugzilla.novell.com/show_bug.cgi?id=608071
https://bugzilla.redhat.com/show_bug.cgi?id=599564 Patch
https://rhn.redhat.com/errata/RHSA-2012-0095.html
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583183
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583316
http://bugs.ghostscript.com/show_bug.cgi?id=691339 Exploit
http://bugs.ghostscript.com/show_bug.cgi?id=691350
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043913.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043948.html
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://savannah.gnu.org/forum/forum.php?forum_id=6368
http://secunia.com/advisories/40452 Vendor Advisory
http://secunia.com/advisories/40475 Vendor Advisory
http://secunia.com/advisories/40532 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201412-17.xml
http://www.osvdb.org/66247
http://www.securityfocus.com/archive/1/511433
http://www.securityfocus.com/archive/1/511472 Exploit
http://www.securityfocus.com/archive/1/511474 Exploit
http://www.securityfocus.com/archive/1/511476
http://www.vupen.com/english/advisories/2010/1757 Vendor Advisory
https://bugzilla.novell.com/show_bug.cgi?id=608071
https://bugzilla.redhat.com/show_bug.cgi?id=599564 Patch
https://rhn.redhat.com/errata/RHSA-2012-0095.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*
cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*
cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*
cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*
cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*

History

No history.

Information

Published : 2010-07-22 05:43

Updated : 2025-04-11 00:51


NVD link : CVE-2010-2055

Mitre link : CVE-2010-2055

CVE.ORG link : CVE-2010-2055


JSON object : View

Products Affected

artifex

  • ghostscript_fonts
  • afpl_ghostscript
  • gpl_ghostscript
CWE
CWE-17

DEPRECATED: Code