Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2008-0411
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.104
EPSS Ranking
92.8%
CVSS Severity
CVSS v2 Score
6.8
References
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00009.html
http://scary.beasts.org/security/CESA-2008-001.html
http://secunia.com/advisories/29101
http://secunia.com/advisories/29103
http://secunia.com/advisories/29112
http://secunia.com/advisories/29135
http://secunia.com/advisories/29147
http://secunia.com/advisories/29154
http://secunia.com/advisories/29169
http://secunia.com/advisories/29196
http://secunia.com/advisories/29314
http://secunia.com/advisories/29768
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.370633
http://wiki.rpath.com/Advisories:rPSA-2008-0082
http://www.debian.org/security/2008/dsa-1510
http://www.gentoo.org/security/en/glsa/glsa-200803-14.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:055
http://www.redhat.com/support/errata/RHSA-2008-0155.html
http://www.securityfocus.com/archive/1/488932/100/0/threaded
http://www.securityfocus.com/archive/1/488946/100/0/threaded
http://www.securityfocus.com/bid/28017
http://www.securitytracker.com/id?1019511
http://www.ubuntu.com/usn/usn-599-1
http://www.vupen.com/english/advisories/2008/0693/references
https://issues.rpath.com/browse/RPL-2217
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9557
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00085.html
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00009.html
http://scary.beasts.org/security/CESA-2008-001.html
http://secunia.com/advisories/29101
http://secunia.com/advisories/29103
http://secunia.com/advisories/29112
http://secunia.com/advisories/29135
http://secunia.com/advisories/29147
http://secunia.com/advisories/29154
http://secunia.com/advisories/29169
http://secunia.com/advisories/29196
http://secunia.com/advisories/29314
http://secunia.com/advisories/29768
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.370633
http://wiki.rpath.com/Advisories:rPSA-2008-0082
http://www.debian.org/security/2008/dsa-1510
http://www.gentoo.org/security/en/glsa/glsa-200803-14.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:055
http://www.redhat.com/support/errata/RHSA-2008-0155.html
http://www.securityfocus.com/archive/1/488932/100/0/threaded
http://www.securityfocus.com/archive/1/488946/100/0/threaded
http://www.securityfocus.com/bid/28017
http://www.securitytracker.com/id?1019511
http://www.ubuntu.com/usn/usn-599-1
http://www.vupen.com/english/advisories/2008/0693/references
https://issues.rpath.com/browse/RPL-2217
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9557
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00085.html
Products affected by CVE-2008-0411
Ghostscript
»
Ghostscript
»
Version:
N/A
cpe:2.3:a:ghostscript:ghostscript:-
Ghostscript
»
Ghostscript
»
Version:
0
cpe:2.3:a:ghostscript:ghostscript:0
Ghostscript
»
Ghostscript
»
Version:
8.0.1
cpe:2.3:a:ghostscript:ghostscript:8.0.1
Ghostscript
»
Ghostscript
»
Version:
8.15
cpe:2.3:a:ghostscript:ghostscript:8.15
Ghostscript
»
Ghostscript
»
Version:
8.61
cpe:2.3:a:ghostscript:ghostscript:8.61
Debian
»
Debian Linux
»
Version:
3.1
cpe:2.3:o:debian:debian_linux:3.1
Debian
»
Debian Linux
»
Version:
4.0
cpe:2.3:o:debian:debian_linux:4.0
Mandrakesoft
»
Mandrake Linux
»
Version:
2007
cpe:2.3:o:mandrakesoft:mandrake_linux:2007
Mandrakesoft
»
Mandrake Linux
»
Version:
2007.0_x86_64
cpe:2.3:o:mandrakesoft:mandrake_linux:2007.0_x86_64
Mandrakesoft
»
Mandrake Linux
»
Version:
2007.1
cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1
Mandrakesoft
»
Mandrake Linux
»
Version:
2008.0
cpe:2.3:o:mandrakesoft:mandrake_linux:2008.0
Mandrakesoft
»
Mandrake Linux Corporate Server
»
Version:
3.0
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0
Mandrakesoft
»
Mandrake Linux Corporate Server
»
Version:
4.0
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0
Mandrakesoft
»
Mandrakesoft Corporate Server
»
Version:
3.0_x86_64
cpe:2.3:o:mandrakesoft:mandrakesoft_corporate_server:3.0_x86_64
Mandrakesoft
»
Mandrakesoft Corporate Server
»
Version:
4.0_x86_64
cpe:2.3:o:mandrakesoft:mandrakesoft_corporate_server:4.0_x86_64
Redhat
»
Desktop
»
Version:
3.0
cpe:2.3:o:redhat:desktop:3.0
Redhat
»
Desktop
»
Version:
4.0
cpe:2.3:o:redhat:desktop:4.0
Redhat
»
Enterprise Linux
»
Version:
5
cpe:2.3:o:redhat:enterprise_linux:5
Redhat
»
Enterprise Linux
»
Version:
as_3
cpe:2.3:o:redhat:enterprise_linux:as_3
Redhat
»
Enterprise Linux
»
Version:
as_4
cpe:2.3:o:redhat:enterprise_linux:as_4
Redhat
»
Enterprise Linux
»
Version:
es_3
cpe:2.3:o:redhat:enterprise_linux:es_3
Redhat
»
Enterprise Linux
»
Version:
es_4
cpe:2.3:o:redhat:enterprise_linux:es_4
Redhat
»
Enterprise Linux
»
Version:
ws_3
cpe:2.3:o:redhat:enterprise_linux:ws_3
Redhat
»
Enterprise Linux
»
Version:
ws_4
cpe:2.3:o:redhat:enterprise_linux:ws_4
Redhat
»
Enterprise Linux Desktop
»
Version:
5
cpe:2.3:o:redhat:enterprise_linux_desktop:5
Redhat
»
Enterprise Linux Desktop Workstation
»
Version:
5
cpe:2.3:o:redhat:enterprise_linux_desktop_workstation:5
Rpath
»
Rpath Linux
»
Version:
1
cpe:2.3:o:rpath:rpath_linux:1
Suse
»
Novell Linux Pos
»
Version:
9
cpe:2.3:o:suse:novell_linux_pos:9
Suse
»
Open Suse
»
Version:
10.2
cpe:2.3:o:suse:open_suse:10.2
Suse
»
Open Suse
»
Version:
10.3
cpe:2.3:o:suse:open_suse:10.3
Suse
»
Suse Linux
»
Version:
10
cpe:2.3:o:suse:suse_linux:10
Suse
»
Suse Linux
»
Version:
10.1
cpe:2.3:o:suse:suse_linux:10.1
Suse
»
Suse Linux
»
Version:
9.0
cpe:2.3:o:suse:suse_linux:9.0
Suse
»
Suse Open Enterprise Server
»
Version:
0
cpe:2.3:o:suse:suse_open_enterprise_server:0
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved