CVE-2020-15900

Source
https://cve.org/CVERecord?id=CVE-2020-15900
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15900.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-15900
Downstream
Related
Published
2020-07-28T16:15:12.840Z
Modified
2026-02-11T12:43:42.022888Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A memory corruption issue was found in Artifex Ghostscript 9.50 and 9.52. Use of a non-standard PostScript operator can allow overriding of file access controls. The 'rsearch' calculation for the 'post' size resulted in a size that was too large, and could underflow to max uint32_t. This was fixed in commit 5d499272b95a6b890a1397e11d20937de000d31b.

References

Affected packages

Git / github.com/artifexsoftware/ghostpdl

Affected ranges

Type
GIT
Repo
https://github.com/artifexsoftware/ghostpdl
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other
chrisl-test
ghostpdl
ghostpdl-ebuild
ghostpdl-1.*
ghostpdl-1.53
ghostpdl-1.54
ghostpdl-8.*
ghostpdl-8.70
ghostpdl-8.71
ghostpdl-9.*
ghostpdl-9.00
ghostpdl-9.01
ghostpdl-9.02
ghostpdl-9.52-test-base-1
ghostpdl-9.52-test-base-3
ghostpdl-9.52-test-base-4
ghostscript-6.*
ghostscript-6.0
ghostscript-6.01
ghostscript-6.20
ghostscript-6.21
ghostscript-6.22
ghostscript-6.23
ghostscript-6.30
ghostscript-6.31
ghostscript-6.32
ghostscript-6.50
ghostscript-6.60
ghostscript-6.61
ghostscript-6.62
ghostscript-6.63
ghostscript-6.64
ghostscript-7.*
ghostscript-7.00
ghostscript-7.02
ghostscript-7.03
ghostscript-7.04
ghostscript-7.20
ghostscript-7.21
ghostscript-7.22
ghostscript-7.30
ghostscript-7.31
ghostscript-7.32
ghostscript-7.33
ghostscript-8.*
ghostscript-8.00
ghostscript-8.01
ghostscript-8.10
ghostscript-8.11
ghostscript-8.12
ghostscript-8.13
ghostscript-8.14
ghostscript-8.15
ghostscript-8.30
ghostscript-8.31
ghostscript-8.32
ghostscript-8.33
ghostscript-8.50
ghostscript-8.51
ghostscript-8.52
ghostscript-8.53
ghostscript-8.56
ghostscript-8.57
ghostscript-8.60
ghostscript-8.61
ghostscript-8.62
ghostscript-8.63
ghostscript-8.64
ghostscript-8.70
ghostscript-8.71
ghostscript-9.*
ghostscript-9.01
ghostscript-9.02
jbig2dec-0.*
jbig2dec-0.14

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15900.json"
vanir_signatures
[
    {
        "target": {
            "file": "psi/zstring.c",
            "function": "search_impl"
        },
        "digest": {
            "length": 988.0,
            "function_hash": "46940119944633808988474283792764943994"
        },
        "signature_type": "Function",
        "id": "CVE-2020-15900-2b0aa55f",
        "source": "https://github.com/artifexsoftware/ghostpdl/commit/5d499272b95a6b890a1397e11d20937de000d31b",
        "deprecated": false,
        "signature_version": "v1"
    },
    {
        "target": {
            "file": "psi/zstring.c"
        },
        "digest": {
            "line_hashes": [
                "190536486911980564259186184284028251322",
                "310639197693366512344773929327924035765",
                "39712407557047782312763705291186047712",
                "207635925999652990285057282992758349798",
                "285190544700574057999012646783096917780",
                "76464664580891842030516054201090584625",
                "100906624819924311054212833575538464718",
                "310528718498703024283454547331776211651",
                "171002816041803318278104589197268229569",
                "288390351824469318354059772346635214554"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2020-15900-a3bb7899",
        "source": "https://github.com/artifexsoftware/ghostpdl/commit/5d499272b95a6b890a1397e11d20937de000d31b",
        "deprecated": false,
        "signature_version": "v1"
    }
]