CVE-2009-0583
Summary
| CVE | CVE-2009-0583 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2009-03-23 20:00:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:M/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Argyllcms | Argyllcms | 0.1.0 | All | All | All |
| Application | Argyllcms | Argyllcms | 0.2.0 | All | All | All |
| Application | Argyllcms | Argyllcms | 0.2.1 | All | All | All |
| Application | Argyllcms | Argyllcms | 0.2.2 | All | All | All |
| Application | Argyllcms | Argyllcms | 0.3.0 | All | All | All |
| Application | Argyllcms | Argyllcms | 0.6.0 | All | All | All |
| Application | Argyllcms | Argyllcms | 0.7.0 | beta_8 | All | All |
| Application | Argyllcms | Argyllcms | 1.0.0 | All | All | All |
| Application | Argyllcms | Argyllcms | 1.0.2 | All | All | All |
| Application | Argyllcms | Argyllcms | All | All | All | All |
| Application | Ghostscript | Ghostscript | 5.50 | All | All | All |
| Application | Ghostscript | Ghostscript | 7.05 | All | All | All |
| Application | Ghostscript | Ghostscript | 7.07 | All | All | All |
| Application | Ghostscript | Ghostscript | 8.0.1 | All | All | All |
| Application | Ghostscript | Ghostscript | 8.15 | All | All | All |
| Application | Ghostscript | Ghostscript | 8.15.2 | All | All | All |
| Application | Ghostscript | Ghostscript | 8.54 | All | All | All |
| Application | Ghostscript | Ghostscript | 8.56 | All | All | All |
| Application | Ghostscript | Ghostscript | 8.57 | All | All | All |
| Application | Ghostscript | Ghostscript | 8.61 | All | All | All |
| Application | Ghostscript | Ghostscript | 8.62 | All | All | All |
| Application | Ghostscript | Ghostscript | 8.63 | All | All | All |
| Application | Ghostscript | Ghostscript | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Support / Security / Advisories / / MDVSA-2009:095 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| Argyll Color Management System icclib Multiple Vulnerabilities - Advisories - Community | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| USN-743-1: Ghostscript vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | |
| SUSE Update for Multiple Packages - Advisories - Community | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Gentoo update for ghostscript - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| [SECURITY] Fedora 10 Update: ghostscript-8.63-5.fc10 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Vendor Advisory |
| Ubuntu update for ghostscript - Advisories - Community | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| issues.rpath.com/browse/RPL-2991 | af854a3a-2127-422b-91ae-364da2661108 | issues.rpath.com | |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2009:007 | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Red Hat update for ghostscript - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Fedora update for argyllcms - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Sun Solaris 9 Ghostscript Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| USN-757-1: Ghostscript vulnerabilities | Ubuntu security notices | af854a3a-2127-422b-91ae-364da2661108 | usn.ubuntu.com | |
| Ghostscript Overflows in International Color Consortium Format Library Lets Users Execute Arbitrary Code - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| Debian update for ghostscript - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Advisories:rPSA-2009-0050 - rPath Wiki | af854a3a-2127-422b-91ae-364da2661108 | wiki.rpath.com | Vendor Advisory |
| [SECURITY] Fedora 10 Update: argyllcms-1.0.3-3.fc10 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Ghostscript icclib Multiple Vulnerabilities - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Gentoo Linux Documentation -- Ghostscript: User-assisted execution of arbitrary code | af854a3a-2127-422b-91ae-364da2661108 | www.gentoo.org | |
| AusCERT - ESB-2009.0259 -- [UNIX/Linux][RedHat] -- Moderate: ghostscript security update | af854a3a-2127-422b-91ae-364da2661108 | www.auscert.org.au | US Government Resource |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Vendor Advisory |
| ASA-2009-098 (RHSA-2009-0345) | af854a3a-2127-422b-91ae-364da2661108 | support.avaya.com | |
| [SECURITY] Fedora 9 Update: argyllcms-1.0.3-3.fc9 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Ghostscript Multiple Input Validation and Integer Overflow Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Support / Security / Advisories / / MDVSA-2009:096 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Sun Solaris Ghostscript Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Webmail | OVH- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| [SECURITY] Fedora 9 Update: ghostscript-8.63-2.fc9 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Vendor Advisory |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| Gentoo Bug 261087 - app-text/ghostscript-* ICC Library integer overflows (CVE-2009-0583,CVE-2009-0584) | af854a3a-2127-422b-91ae-364da2661108 | bugs.gentoo.org | |
| Fedora update for ghostscript - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Bug 487742 – CVE-2009-0583 ghostscript, argyllcms: Multiple integer overflows in the International Color Consortium Format Library | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | Vendor Advisory |
| Ubuntu update for ghostscript - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Debian -- Security Information -- DSA-1746-1 ghostscript | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Vendor Advisory |
| sunsolve.sun.com/search/document.do | af854a3a-2127-422b-91ae-364da2661108 | sunsolve.sun.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| access.redhat.com | CVE-2009-0583 | MITRE | access.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.