In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written.
References
Configurations
History
14 Feb 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://ghostscript.readthedocs.io/en/latest/News.html - Release Notes | |
References | () https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html - Mailing List, Third Party Advisory | |
References | () https://www.debian.org/security/2023/dsa-5383 - Third Party Advisory | |
References | () https://bugs.ghostscript.com/show_bug.cgi?id=706494 - Exploit, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/04/12/4 - | |
References | () https://security.gentoo.org/glsa/202309-03 - |
07 Nov 2023, 04:10
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
15 Apr 2023, 04:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Apr 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Apr 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Apr 2023, 02:24
Type | Values Removed | Values Added |
---|---|---|
References | (DEBIAN) https://www.debian.org/security/2023/dsa-5383 - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html - Mailing List, Third Party Advisory | |
References | (MISC) https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=37ed5022cecd584de868933b5b60da2e995b3179 - Patch | |
References | (MISC) https://ghostscript.readthedocs.io/en/latest/News.html - Release Notes | |
References | (MISC) https://bugs.ghostscript.com/show_bug.cgi?id=706494 - Exploit, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Debian debian Linux
Artifex Artifex ghostscript Debian |
|
CWE | CWE-787 | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
06 Apr 2023, 04:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Apr 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-03-31 17:15
Updated : 2025-02-14 20:15
NVD link : CVE-2023-28879
Mitre link : CVE-2023-28879
JSON object : View
Products Affected
artifex
- ghostscript
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write