Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-16509

Опубликовано: 21 авг. 2018
Источник: redhat
CVSS3: 7.3
EPSS Критический

Описание

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.

It was discovered that the ghostscript /invalidaccess checks fail under certain conditions. An attacker could possibly exploit this to bypass the -dSAFER protection and, for example, execute arbitrary shell commands via a specially crafted PostScript document.

Отчет

This issue did affect the versions of ghostscript as shipped with Red Hat Enterprise Linux 5, 6, and 7. Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Меры по смягчению последствий

  • ImageMagick relies on ghostscript when processing certain files formats. Thus, ImageMagick can be used as an attack vector. In order to prevent ImageMagick from processing those files on Red Hat Enterprise Linux 6 and 7, you can disable the use of ghostscript and the processing of PS, EPS, PDF, and XPS file formats in ImageMagick's security policy by opening /etc/ImageMagick/policy.xml and adding the following lines to the "" section of the file:
<policy domain="coder" rights="none" pattern="PS" /> <policy domain="coder" rights="none" pattern="EPS" /> <policy domain="coder" rights="none" pattern="PDF" /> <policy domain="coder" rights="none" pattern="XPS" /> <policy domain="delegate" rights="none" pattern="gs" />
  • Additionally, this issue can be triggered when processing files in order to generate thumbnails, for example when browsing a folder containing a malicious PostScript file in Nautilus. To prevent this, remove or rename the "/usr/bin/evince-thumbnailer" executable. In Red Hat Enterprise Linux v.7.6 and above, the thumbnailing is done in a sandbox.
  • It is possible to run PDF/PS viewers, such as evince and okular, in a SELinux sandbox using the sandbox command from the policycoreutils-sandbox package : $ sandbox -X evince <untrusted-file.pdf> The sandbox will prevent an attacker to make modifications on the file system.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5ghostscriptWill not fix
Red Hat Enterprise Linux 8ghostscriptNot affected
Red Hat OpenShift Container Platform 3.10mediawikiNot affected
Red Hat OpenShift Container Platform 3.11mediawikiNot affected
Red Hat OpenShift Container Platform 3.2mediawikiNot affected
Red Hat OpenShift Container Platform 3.3mediawikiNot affected
Red Hat OpenShift Container Platform 3.4mediawikiNot affected
Red Hat OpenShift Container Platform 3.5mediawikiNot affected
Red Hat OpenShift Container Platform 3.6mediawikiNot affected
Red Hat OpenShift Container Platform 3.7mediawikiNot affected

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1619748ghostscript: /invalidaccess bypass after failed restore (699654)

EPSS

Процентиль: 100%
0.91744
Критический

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 7 лет назад

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.

CVSS3: 7.8
nvd
около 7 лет назад

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.

CVSS3: 7.8
debian
около 7 лет назад

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect ...

CVSS3: 7.8
github
больше 3 лет назад

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.

oracle-oval
почти 7 лет назад

ELSA-2018-3760: ghostscript security update (IMPORTANT)

EPSS

Процентиль: 100%
0.91744
Критический

7.3 High

CVSS3