首页 -> 安全研究

安全研究

安全漏洞
GhostScript任意命令执行漏洞

发布日期:2003-05-17
更新日期:2003-06-04

受影响系统:
Aladdin Enterprises Ghostscript 7.06
Aladdin Enterprises Ghostscript 7.05
Aladdin Enterprises Ghostscript 6.53
Aladdin Enterprises Ghostscript 6.51
Aladdin Enterprises Ghostscript 5.50.8
Aladdin Enterprises Ghostscript 5.50
Aladdin Enterprises Ghostscript 5.10.16
Aladdin Enterprises Ghostscript 5.10.15
Aladdin Enterprises Ghostscript 5.10.10
Aladdin Enterprises Ghostscript
Aladdin Enterprises Ghostscript 6.52
    - Caldera OpenLinux Server 3.1.1
    - Caldera OpenLinux Server 3.1
    - Caldera OpenLinux Workstation 3.1.1
    - Caldera OpenLinux Workstation 3.1
    - RedHat Linux 8.0
    - RedHat Linux 7.3
    - RedHat Linux 7.2
    - RedHat Linux 7.1
    - RedHat Linux 7.0
    - RedHat Linux 6.2
不受影响系统:
Aladdin Enterprises Ghostscript 7.07
描述:
BUGTRAQ  ID: 7757
CVE(CAN) ID: CVE-2003-0354

GNU Ghostscript是一款PostScript语言解析器,经常在那些不内置PostScript解析器的打印机进行打印时使用。

Ghostscript当处理畸形PS文件时存在缺陷,远程或者本地攻击者可以利用这个漏洞构建恶意PS文件,诱使用户打开,可能以用户进程权限在系统上执行任意指令。

7.07版本之前的Ghostscript即使在-dSAFER选项使用的情况下,也存在漏洞允许恶意PS文件执行任意命令。在REDHAT下,如果使用-dPARANOIDSAFER选项就不受此漏洞影响,因此在REDHAT Linux下恶意打印作业将不能用于利用此漏洞。

<*来源:Red Hat Security Advisory
  
  链接:https://www.redhat.com/support/errata/RHSA-2003-181.html
*>

建议:
厂商补丁:

Aladdin Enterprises
-------------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

Aladdin Enterprises Upgrade ghostscript-7.07.tar.gz
http://prdownloads.sourceforge.net/ghostscript/ghostscript-7.07.tar.gz?download

RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2003:181-01)以及相应补丁:
RHSA-2003:181-01:Updated ghostscript packages fix vulnerability
链接:https://www.redhat.com/support/errata/RHSA-2003-181.html

REDHAT Linux下补丁下载:

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/ghostscript-6.51-16.1.7x.1.src.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/ghostscript-6.51-16.1.7x.1.i386.rpm

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/ghostscript-6.51-16.3.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/ghostscript-6.51-16.3.i386.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/ghostscript-6.51-16.3.ia64.rpm

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/ghostscript-6.52-9.5.src.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/ghostscript-6.52-9.5.i386.rpm

Red Hat Linux 8.0:

SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/ghostscript-7.05-20.1.src.rpm

i386:
ftp://updates.redhat.com/8.0/en/os/i386/ghostscript-7.05-20.1.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/ghostscript-devel-7.05-20.1.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/ghostscript-gtk-7.05-20.1.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/hpijs-1.1-20.1.i386.rpm

Red Hat Linux 9:

SRPMS:
ftp://updates.redhat.com/9/en/os/SRPMS/ghostscript-7.05-32.1.src.rpm

i386:
ftp://updates.redhat.com/9/en/os/i386/ghostscript-7.05-32.1.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/ghostscript-devel-7.05-32.1.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/hpijs-1.3-32.1.i386.rpm

相关校验:

MD5 sum                          Package Name
--------------------------------------------------------------------------
17f5e1f86295677e4ad75fc202d26159 7.1/en/os/SRPMS/ghostscript-6.51-16.1.7x.1.src.rpm
db35a7a93ef26ff36c5880580504b43a 7.1/en/os/i386/ghostscript-6.51-16.1.7x.1.i386.rpm
d8b42f6af2bdb9edee0b50459c05ad96 7.2/en/os/SRPMS/ghostscript-6.51-16.3.src.rpm
05589f336b1f45d83d167de9d3d173ca 7.2/en/os/i386/ghostscript-6.51-16.3.i386.rpm
05f55eb8b6252e2c672b83778831e7c2 7.2/en/os/ia64/ghostscript-6.51-16.3.ia64.rpm
d7107c39c5d04e1afd1c8d67e203713f 7.3/en/os/SRPMS/ghostscript-6.52-9.5.src.rpm
ebba3a35451201da84c9898b639f85ef 7.3/en/os/i386/ghostscript-6.52-9.5.i386.rpm
3ce50b988a370f3ff09855abd1089341 8.0/en/os/SRPMS/ghostscript-7.05-20.1.src.rpm
59f89e35fa9ebe4487eaa80576cc7253 8.0/en/os/i386/ghostscript-7.05-20.1.i386.rpm
7dc5193bc01725273294c2c3f1959434 8.0/en/os/i386/ghostscript-devel-7.05-20.1.i386.rpm
17b0e8fa73551ee829fde0b9c20e98ac 8.0/en/os/i386/ghostscript-gtk-7.05-20.1.i386.rpm
df0c388dd079bb13e1ce0cf0dbcaee63 8.0/en/os/i386/hpijs-1.1-20.1.i386.rpm
0addc0a8db3d8744390432c5d1441fb3 9/en/os/SRPMS/ghostscript-7.05-32.1.src.rpm
d11602ea9618a680f1224b8fa3228f55 9/en/os/i386/ghostscript-7.05-32.1.i386.rpm
d27dd715e6a662727f7f582f52d80bfc 9/en/os/i386/ghostscript-devel-7.05-32.1.i386.rpm
f2ad407e793d21c730aa1e211c6bc1c9 9/en/os/i386/hpijs-1.3-32.1.i386.rpm

浏览次数:4076
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障