CVE-2020-14373
Summary
| CVE | CVE-2020-14373 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-09-03 18:15:00 UTC |
| Updated | 2023-11-07 03:17:00 UTC |
| Description | A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| 1873239 – (CVE-2020-14373) CVE-2020-14373 ghostscript: use-after-free vulnerability in igc_reloc_struct_ptr() could result in DoS via a crafted PDF file |
MISC |
bugzilla.redhat.com |
Issue Tracking, Patch, Third Party Advisory |
| 702851 – use-after-free vulnerability in igc_reloc_struct_ptr() from PDF file |
MISC |
bugs.ghostscript.com |
Exploit, Vendor Advisory |
| git.ghostscript.com Git - ghostpdl.git/commitdiff |
|
git.ghostscript.com |
|
| git.ghostscript.com Git - ghostpdl.git/commitdiff |
MISC |
git.ghostscript.com |
Mailing List, Patch, Vendor Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 159222 Oracle Enterprise Linux Security Update for ghostscript (ELSA-2021-1852)
- 239294 Red Hat Update for ghostscript (RHSA-2021:1852)
- 940105 AlmaLinux Security Update for ghostscript (ALSA-2021:1852)
- 960364 Rocky Linux Security Update for ghostscript (RLSA-2021:1852)