Описание
The getenv and filenameforall functions in Ghostscript 9.10 ignore the "-dSAFER" argument, which allows remote attackers to read data via a crafted postscript file.
It was found that the ghostscript functions getenv and filenameforall did not honor the -dSAFER option, usually used when processing untrusted documents, leading to information disclosure. A specially crafted postscript document could read environment variable and list directory respectively, from the target.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | ghostscript | Will not fix | ||
| Red Hat OpenShift Enterprise 2 | ghostscript | Will not fix | ||
| Red Hat Enterprise Linux 6 | ghostscript | Fixed | RHSA-2017:0014 | 04.01.2017 |
| Red Hat Enterprise Linux 7 | ghostscript | Fixed | RHSA-2017:0013 | 04.01.2017 |
Показывать по
Дополнительная информация
Статус:
4 Medium
CVSS3
4.3 Medium
CVSS2
Связанные уязвимости
The getenv and filenameforall functions in Ghostscript 9.10 ignore the "-dSAFER" argument, which allows remote attackers to read data via a crafted postscript file.
The getenv and filenameforall functions in Ghostscript 9.10 ignore the "-dSAFER" argument, which allows remote attackers to read data via a crafted postscript file.
The getenv and filenameforall functions in Ghostscript 9.10 ignore the ...
4 Medium
CVSS3
4.3 Medium
CVSS2