CVE-2009-0792

N/A Unknown
Published: April 14, 2009 Modified: April 23, 2026
View on NVD

Description

Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images. NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/34373
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/34667
Source: secalert@redhat.com
http://secunia.com/advisories/34711
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/34726
Source: secalert@redhat.com
http://secunia.com/advisories/34729
Source: secalert@redhat.com
http://secunia.com/advisories/34732
Source: secalert@redhat.com
http://secunia.com/advisories/35416
Source: secalert@redhat.com
http://secunia.com/advisories/35559
Source: secalert@redhat.com
http://secunia.com/advisories/35569
Source: secalert@redhat.com
https://usn.ubuntu.com/757-1/
Source: secalert@redhat.com
http://secunia.com/advisories/34373
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/34667
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34711
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/34726
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34729
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34732
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35416
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35559
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35569
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-201412-17.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2009-155.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://wiki.rpath.com/Advisories:rPSA-2009-0060
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:095
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:096
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-0420.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-0421.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/502757/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/1708
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=491853
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/50381
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/757-1/
Source: af854a3a-2127-422b-91ae-364da2661108

58 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.2%
79th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

argyllcms ghostscript