CVE-2010-4820Code Injection in Ghostscript

CWE-94Code Injection9 documents7 sources
Severity
4.4MEDIUMNVD
CNA7.2OSV7.2
EPSS
0.1%
top 70.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 27
Latest updateMay 17

Description

Untrusted search path vulnerability in Ghostscript 8.62 allows local users to execute arbitrary PostScript code via a Trojan horse Postscript library file in Encoding/ under the current working directory, a different vulnerability than CVE-2010-2055.

CVSS vector

AV:L/AC:M/C:P/I:P/A:PExploitability: 3.4 | Impact: 6.4

Affected Packages2 packages

Debianartifex/ghostscript< 8.71~dfsg2-6.1+3

🔴Vulnerability Details

3
GHSA
GHSA-37q2-9vp4-q6f4: Untrusted search path vulnerability in Ghostscript 82022-05-17
OSV
CVE-2010-4820: Untrusted search path vulnerability in Ghostscript 82014-10-27
CVEList
CVE-2010-4820: Untrusted search path vulnerability in Ghostscript 82014-10-27

📋Vendor Advisories

3
Red Hat
ghostscript: CWD included in the default library search path2010-05-26
Red Hat
ghostscript: gs_init.ps searched in current directory despite -P-2010-05-26
Debian
CVE-2010-4820: ghostscript - Untrusted search path vulnerability in Ghostscript 8.62 allows local users to ex...2010

💬Community

1
Bugzilla
CVE-2010-4820 ghostscript: CWD included in the default library search path2012-01-05
CVE-2010-4820 — Code Injection in Ghostscript | cvebase