语言:
https://security-tracker.debian.org/tracker/source-package/ghostscript
https://security-tracker.debian.org/tracker/CVE-2023-52722
https://security-tracker.debian.org/tracker/CVE-2024-29510
https://security-tracker.debian.org/tracker/CVE-2024-33869
https://security-tracker.debian.org/tracker/CVE-2024-33870
https://security-tracker.debian.org/tracker/CVE-2024-33871
严重性: High
ID: 197169
文件名: debian_DSA-5692.nasl
版本: 1.8
类型: local
代理: unix
发布时间: 2024/5/16
最近更新时间: 2024/11/15
支持的传感器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
风险因素: High
分数: 7.7
风险因素: Medium
基本分数: 4.9
时间分数: 4.3
矢量: CVSS2#AV:L/AC:L/Au:N/C:N/I:C/A:N
CVSS 分数来源: CVE-2023-52722
风险因素: High
基本分数: 8.8
时间分数: 8.4
矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:H/RL:O/RC:C
CVSS 分数来源: CVE-2024-33871
CPE: p-cpe:/a:debian:debian_linux:ghostscript-doc, p-cpe:/a:debian:debian_linux:libgs9-common, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:ghostscript-x, p-cpe:/a:debian:debian_linux:libgs9, p-cpe:/a:debian:debian_linux:libgs10-common, p-cpe:/a:debian:debian_linux:libgs10, p-cpe:/a:debian:debian_linux:ghostscript, p-cpe:/a:debian:debian_linux:libgs-dev, p-cpe:/a:debian:debian_linux:libgs-common, cpe:/o:debian:debian_linux:12.0
必需的 KB 项: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
可利用: true
易利用性: Exploits are available
补丁发布日期: 2024/5/15
漏洞发布日期: 2023/12/14
Metasploit (Ghostscript Command Execution via Format String)
CVE: CVE-2023-52722, CVE-2024-29510, CVE-2024-33869, CVE-2024-33870, CVE-2024-33871
IAVB: 2023-B-0097-S, 2024-B-0074-S