CVE-2010-4054
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
23/10/2010
Last modified:
11/04/2025
Description
The gs_type2_interpret function in Ghostscript allows remote attackers to cause a denial of service (incorrect pointer dereference and application crash) via crafted font data in a compressed data stream, aka bug 691043.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:* | ||
| cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:* | ||
| cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:* | ||
| cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:* | ||
| cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:* | ||
| cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:* | ||
| cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:* | ||
| cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:* | ||
| cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:* | ||
| cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://ghostscript.com/pipermail/gs-cvs/2010-January/010333.html
- http://rhn.redhat.com/errata/RHSA-2012-0096.html
- http://security.gentoo.org/glsa/glsa-201412-17.xml
- http://www.kb.cert.org/vuls/id/538191
- https://rhn.redhat.com/errata/RHSA-2012-0095.html
- http://ghostscript.com/pipermail/gs-cvs/2010-January/010333.html
- http://rhn.redhat.com/errata/RHSA-2012-0096.html
- http://security.gentoo.org/glsa/glsa-201412-17.xml
- http://www.kb.cert.org/vuls/id/538191
- https://rhn.redhat.com/errata/RHSA-2012-0095.html



