Gentoo Logo

Ghostscript: Insecure temporary file use in multiple scripts


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200410-18 / Ghostscript
Release Date October 20, 2004
Latest Revision December 30, 2007: 02
Impact normal
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
app-text/ghostscript-esp < 7.07.1-r7 >= 7.07.1-r7, revision >= 7.05.6-r2 All supported architectures

Related bugreports: #66357


Multiple scripts in the Ghostscript package are vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files with the rights of the user running the script.

2.  Impact Information


Ghostscript is a software package providing an interpreter for the PostScript language and the PDF file format. It also provides output drivers for various file formats and printers.


The, ps2epsi, and scripts create temporary files in world-writeable directories with predictable names.


A local attacker could create symbolic links in the temporary files directory, pointing to a valid file somewhere on the filesystem. When an affected script is called, this would result in the file to be overwritten with the rights of the user running the script, which could be the root user.

3.  Resolution Information


There is no known workaround at this time.


Ghostscript users on all architectures except PPC should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge sync
# emerge -pv ">=app-text/ghostscript-esp-7.07.1-r7"
# emerge ">=app-text/ghostscript-esp-7.07.1-r7"

Ghostscript users on the PPC architecture should upgrade to the latest stable version on their architecture:

Code Listing 3.2: Resolution

# emerge sync
# emerge -pv ">=app-text/ghostscript-esp-7.05.6-r2"
# emerge ">=app-text/ghostscript-esp-7.05.6-r2"

4.  References


Page updated October 20, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.