Public Date:
599564: CVE-2010-2055 ghostscript: searched in current directory despite -P-

The MITRE CVE dictionary describes this issue as:

Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using, a different vulnerability than CVE-2010-4820.

Find out more about CVE-2010-2055 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 4.4
Base Metrics AV:L/AC:M/Au:N/C:P/I:P/A:P
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (ghostscript) RHSA-2012:0095 2012-02-02
Red Hat Enterprise Linux 6 (ghostscript) RHSA-2012:0095 2012-02-02

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 4 ghostscript Not affected
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.
Last Modified

CVE description copyright © 2017, The MITRE Corporation