Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 1 Jun 2010 14:41:41 -0400 (EDT)
From: Josh Bressers <>
Cc: "Steven M. Christey" <>
Subject: Re: CVE request: ghostscript and gv

Please use CVE-2010-2055 for this.



----- "Ludwig Nussel" <> wrote:

> Hi,
> ghostscript executes initialization files relative to the current
> directory. Unfortunately the -dSAFER option has no effect on those
> files. So when viewing a file e.g. in /tmp a local attacker could
> have the victim execute arbitrary postscript programs.
> Upstream suggested to use -P- in addition to -dSAFER. That however
> would mean every program using gs to render postscript has to be
> checked. So fixing ghostscripts default behavior might be easier for
> distributions.
> In the Debian bug report Paul also mentiones that gv creates a
> temporary file in an insecure way:
> cu
> Ludwig
> -- 
>  (o_   Ludwig Nussel
>  //\   
>  V_/_
> SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.