DEBIAN-CVE-2009-4270

Source
https://security-tracker.debian.org/tracker/CVE-2009-4270
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2009-4270.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2009-4270
Upstream
Published
2009-12-21T16:30:00Z
Modified
2025-09-25T00:12:29.931637Z
Summary
[none]
Details

Stack-based buffer overflow in the errprintf function in base/gsmisc.c in ghostscript 8.64 through 8.70 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file, as originally reported for debug logging code in gdevcups.c in the CUPS output driver.

References

Affected packages

Debian:11 / ghostscript

Package

Name
ghostscript
Purl
pkg:deb/debian/ghostscript?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.70~dfsg-2.1

Ecosystem specific

{
    "urgency": "medium"
}

Debian:12 / ghostscript

Package

Name
ghostscript
Purl
pkg:deb/debian/ghostscript?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.70~dfsg-2.1

Ecosystem specific

{
    "urgency": "medium"
}

Debian:13 / ghostscript

Package

Name
ghostscript
Purl
pkg:deb/debian/ghostscript?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.70~dfsg-2.1

Ecosystem specific

{
    "urgency": "medium"
}

Debian:14 / ghostscript

Package

Name
ghostscript
Purl
pkg:deb/debian/ghostscript?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.70~dfsg-2.1

Ecosystem specific

{
    "urgency": "medium"
}