Debian Linux Security Advisory 2080-1 - Several security issues have been discovered in Ghostscript, the GPL PostScript/PDF interpreter, which might lead to the execution of arbitrary code if a user processes a malformed PDF or Postscript file.
e4041acaa31e18f427619f7fda91a9bb056b0d4e044eec876f34876cc862fced
Two working proof of concept exploits for a stack overflow in Ghostscript. One works against PCBSD exploiting the vulnerability through CUPS. The other creates a .ps file that will trigger the vulnerability.
5ae9270895d3e789549d5022b11b8a33534564778a2cf307bd28c33902b28c71
Ubuntu Security Notice 961-1 - David Srbecky discovered that Ghostscript incorrectly handled debug logging. It was discovered that Ghostscript incorrectly handled certain malformed files. Dan Rosenberg discovered that Ghostscript incorrectly handled certain recursive Postscript files. Rodrigo Rubira Branco and Dan Rosenberg discovered that Ghostscript incorrectly handled certain malformed Postscript files.
fc3e534dc69b0ee865fdb2519e7623cba43d1b89824c7c118c7d038004559fd7
Mandriva Linux Security Advisory 2010-102 - Stack-based buffer overflow in the parser function in GhostScript 8.70 and 8.64 allows context-dependent attackers to execute arbitrary code via a crafted PostScript file. Packages for 2008.0 and 2009.0 are provided due to the Extended Maintenance Program for those products. The updated packages have been patched to correct this issue.
7e27b6082c97e883787ab7e6dc064195f77bb44428bd40321c1f967dfdef3a13
Ghostscript suffers from code execution and stack overflow vulnerabilities.
3ae78b80a2f029d3507689c46f8386059dca772b84fc5bee89098e5fb38a420b