Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-14811

Опубликовано: 28 авг. 2019
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

A flaw was found in, ghostscript versions prior to 9.50, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass -dSAFER restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

A flaw was found in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass -dSAFER restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

Меры по смягчению последствий

Please refer to the "Mitigation" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat 3scale API Management Platform 2ghostscriptNot affected
Red Hat Enterprise Linux 5ghostscriptOut of support scope
Red Hat Enterprise Linux 6ghostscriptOut of support scope
3scale API Management 2.6 on RHEL 73scale-amp26/3scale-operatorFixedRHSA-2019:253421.08.2019
3scale API Management 2.6 on RHEL 73scale-amp26/apicast-gatewayFixedRHSA-2019:253421.08.2019
3scale API Management 2.6 on RHEL 73scale-amp26/backendFixedRHSA-2019:253421.08.2019
3scale API Management 2.6 on RHEL 73scale-amp26/operatorFixedRHSA-2019:253421.08.2019
3scale API Management 2.6 on RHEL 73scale-amp26/toolboxFixedRHSA-2019:253421.08.2019
3scale API Management 2.6 on RHEL 73scale-amp26/zyncFixedRHSA-2019:253421.08.2019
Red Hat Enterprise Linux 7ghostscriptFixedRHSA-2019:258602.09.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-648
https://bugzilla.redhat.com/show_bug.cgi?id=1743757ghostscript: Safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator (701445)

EPSS

Процентиль: 82%
0.01726
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 6 лет назад

A flaw was found in, ghostscript versions prior to 9.50, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

CVSS3: 7.8
nvd
больше 6 лет назад

A flaw was found in, ghostscript versions prior to 9.50, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

CVSS3: 7.8
debian
больше 6 лет назад

A flaw was found in, ghostscript versions prior to 9.50, in the .pdf_h ...

CVSS3: 7.8
github
больше 3 лет назад

A flaw was found in, ghostscript versions prior to 9.28, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

CVSS3: 7.8
fstec
больше 6 лет назад

Уязвимость процедуры .pdf_hook_DSC_Creator программы конвертирования файлов формата PostScript Ghostscript, позволяющая нарушителю получить доступ к файловой системе

EPSS

Процентиль: 82%
0.01726
Низкий

7.3 High

CVSS3