Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-14812

Опубликовано: 28 авг. 2019
Источник: redhat
CVSS3: 7.3

Описание

A flaw was found in all ghostscript versions 9.x before 9.50, in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass -dSAFER restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

A flaw was found in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass -dSAFER restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

Меры по смягчению последствий

Please refer to the "Mitigation" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat 3scale API Management Platform 2ghostscriptNot affected
Red Hat Enterprise Linux 5ghostscriptOut of support scope
Red Hat Enterprise Linux 6ghostscriptOut of support scope
3scale API Management 2.6 on RHEL 73scale-amp26/3scale-operatorFixedRHSA-2019:253421.08.2019
3scale API Management 2.6 on RHEL 73scale-amp26/apicast-gatewayFixedRHSA-2019:253421.08.2019
3scale API Management 2.6 on RHEL 73scale-amp26/backendFixedRHSA-2019:253421.08.2019
3scale API Management 2.6 on RHEL 73scale-amp26/operatorFixedRHSA-2019:253421.08.2019
3scale API Management 2.6 on RHEL 73scale-amp26/toolboxFixedRHSA-2019:253421.08.2019
3scale API Management 2.6 on RHEL 73scale-amp26/zyncFixedRHSA-2019:253421.08.2019
Red Hat Enterprise Linux 7ghostscriptFixedRHSA-2019:258602.09.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-648
https://bugzilla.redhat.com/show_bug.cgi?id=1743754ghostscript: Safer mode bypass by .forceput exposure in setuserparams (701444)

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 6 лет назад

A flaw was found in all ghostscript versions 9.x before 9.50, in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

CVSS3: 7.8
nvd
около 6 лет назад

A flaw was found in all ghostscript versions 9.x before 9.50, in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

CVSS3: 7.8
debian
около 6 лет назад

A flaw was found in all ghostscript versions 9.x before 9.50, in the . ...

github
больше 3 лет назад

A flaw was found in all ghostscript versions 9.x before 9.50, in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

CVSS3: 7.3
fstec
больше 6 лет назад

Уязвимость процедуры .setuserparams2 программы конвертирования файлов формата PostScript Ghostscript, позволяющая нарушителю выполнить произвольные команды или получить доступ к файловой системе

7.3 High

CVSS3