Lucene search

K
archlinuxArchLinuxASA-201911-5
HistoryNov 03, 2019 - 12:00 a.m.

[ASA-201911-5] ghostscript: sandbox escape

2019-11-0300:00:00
security.archlinux.org
11

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

80.2%

Arch Linux Security Advisory ASA-201911-5

Severity: High
Date : 2019-11-03
CVE-ID : CVE-2019-14811 CVE-2019-14812 CVE-2019-14813 CVE-2019-14817
Package : ghostscript
Type : sandbox escape
Remote : No
Link : https://security.archlinux.org/AVG-1031

Summary

The package ghostscript before version 9.50-1 is vulnerable to sandbox
escape.

Resolution

Upgrade to 9.50-1.

pacman -Syu “ghostscript>=9.50-1”

The problems have been fixed upstream in version 9.50.

Workaround

None.

Description

  • CVE-2019-14811 (sandbox escape)

Safer Mode Bypass by .forceput Exposure in .pdf_hook_DSC_Creator.

  • CVE-2019-14812 (sandbox escape)

Safer Mode Bypass by .forceput Exposure in setuserparams

  • CVE-2019-14813 (sandbox escape)

Safer Mode Bypass by .forceput Exposure in setsystemparams

  • CVE-2019-14817 (sandbox escape)

Safer Mode Bypass by .forceput Exposure in .pdfexectoken and other
procedures.

Impact

An attacker is able to escape the sandbox provided by ghostscript.

References

https://marc.info/?l=oss-security&m=156699539604858
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=885444fcbe10dc42787ecb76686c8ee4dd33bf33
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=cd1b1cacadac2479e291efe611979bdc1b3bdb19
https://security.archlinux.org/CVE-2019-14811
https://security.archlinux.org/CVE-2019-14812
https://security.archlinux.org/CVE-2019-14813
https://security.archlinux.org/CVE-2019-14817

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyghostscript< 9.50-1UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

80.2%