-
Notifications
You must be signed in to change notification settings - Fork 0
Artifex Ghostscript 10.2.1 DoS
Fabien edited this page May 22, 2024
·
1 revision
Artifex Ghostscript is an interpreter for PostScript and PDF files. Versions prior to 10.2.1 contain multiple vulnerabilities that can lead to Denial of Service (DoS) attacks, allowing attackers to crash the application or exhaust system resources.
- Severity: Medium
- Application Crash: Vulnerabilities can be exploited to crash Ghostscript, rendering it unusable.
- Resource Exhaustion: Attackers can cause the application to consume excessive system resources, leading to performance degradation and potential system outages.
- Service Disruption: Continuous exploitation can result in prolonged service downtime, affecting availability.
- Memory Handling Errors: Improper memory allocation and deallocation can lead to crashes.
- Infinite Loop Bugs: Certain crafted inputs can cause the application to enter infinite loops, consuming CPU and memory resources.
- Improper Input Validation: Failure to properly validate inputs can allow malicious files to exploit vulnerabilities in Ghostscript.
-
Update to Latest Version:
-
Ensure Ghostscript is updated to version 10.2.1 or later, which includes fixes for known DoS vulnerabilities.
sudo apt-get update sudo apt-get install ghostscript
-
-
Implement Input Validation
- Validate and sanitize all inputs before processing them with Ghostscript to mitigate the risk of malicious files.
-
Limit Resource Usage:
-
Configure resource limits for Ghostscript processes to prevent resource exhaustion attacks.
ulimit -v 1048576 # Set a limit of 1GB of virtual memory
-
# Example exploit to trigger a DoS condition in Ghostscript
gs -q -dSAFER -dNODISPLAY -c "300000000 300000000 scale 0 0 moveto 1 setlinewidth stroke"
This example shows how a crafted PostScript command can be used to exploit a vulnerability in Ghostscript, causing it to consume excessive resources and potentially crash.
-
For Ubuntu/Debian:
sudo apt-get update sudo apt-get install ghostscript
-
For Red Hat/CentOS:
sudo yum update sudo yum install ghostscript
- Home - Return to this main page.
- Explore detailed vulnerability categories and entries via the sidebar.
- Microsoft Teams < 1.6.0.11166 Information Disclosure↗
- Microsoft Teams < 1.6.0.18681 RCE↗
- Microsoft Windows Unquoted Service Path Enumeration↗
- Microsoft XML Parser (MSXML) and XML Core Services Unsupported↗
- Security Updates for Microsoft .NET Framework↗
- Security Updates for Microsoft Office Products C2R↗
- Security Updates for Microsoft SQL Server↗
- Windows Defender Antimalware/Antivirus Signature Definition Check↗
- Windows Speculative Execution Configuration Check↗
- WinVerifyTrust Signature Validation CVE-2013-3900 Mitigation↗
- SSL Certificate Cannot Be Trusted↗
- SSL Certificate Chain Contains RSA Keys Less Than 2048 bits↗
- SSL Certificate with Wrong Hostname↗
- SSL Medium Strength Cipher Suites Supported (SWEET32)↗
- SSL Self-Signed Certificate↗
- SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)↗
- TLS Version 1.0 Protocol Detection↗
- TLS Version 1.1 Protocol Deprecated↗
- Apache 2.4.x < 2.4.58 Multiple Vulnerabilities↗
- Apache Log4j Vulnerabilities↗
- Apache Solr Unauthenticated Access Information Disclosure↗
- Apache Struts Vulnerabilities↗
- Apache Tomcat Vulnerabilities↗
- Amazon Corretto Java 11.x < 11.0.19.7.1 Multiple Vulnerabilities↗
- OpenJDK Vulnerabilities↗
- Oracle Java SE Vulnerabilities↗
- 7-Zip < 23.00 Multiple Vulnerabilities↗
- Adobe Acrobat Vulnerabilities↗
- AMQP Cleartext Authentication↗
- Artifex Ghostscript < 10.2.1 DoS↗
- Chargen UDP Service Remote DoS↗
- Curl 7.84 <= 8.2.1 Header DoS (CVE-2023-38039)↗
- Echo Service Detection↗
- HSTS Missing From HTTPS Server (RFC 6797)↗
- HTTP TRACE / TRACK Methods Allowed↗
- Insecure Windows Service Permissions↗
- Keepass < 2.54 Information disclosure↗
- Notepad++ < 8.5.7 Multiple Buffer Overflow Vulnerabilities↗
- Quote of the Day (QOTD) Service Detection↗
- VMware Tools 10.3.x / 11.x / 12.x < 12.3.5 Token Bypass↗
- X Server Detection↗
- Template -> Use this template for new vulnerabilities