FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

Ghostscript -- Security bypass vulnerabilities

Affected packages
ghostscript9-agpl-base < 9.50
ghostscript9-agpl-x11 < 9.50

Details

VuXML ID 22ae307a-1ac4-11ea-b267-001cc0382b2f
Discovery 2019-08-20
Entry 2019-12-09

Cedric Buissart (Red Hat) reports:

A flaw was found in, ghostscript versions prior to 9.50, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

A flaw was found in all ghostscript versions 9.x before 9.50, in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

A flaw was found in ghostscript, versions 9.x before 9.50, in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

A flaw was found in, ghostscript versions prior to 9.50, in the .pdfexectoken and other procedures where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

References

CVE Name CVE-2019-14811
CVE Name CVE-2019-14812
CVE Name CVE-2019-14813
CVE Name CVE-2019-14817