SB2019013139 - Command Injection in ghostscript (Alpine package)
Published: January 31, 2019
Security Bulletin ID
SB2019013139
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Command Injection (CVE-ID: CVE-2019-6116)
The vulnerability allows a remote attacker to execute arbitrary commands on the target system.
The vulnerability exists due to leak of sensitive operators on the operand stack when a pseudo-operator pushes a subroutine. A remote unauthenticated attacker can supply a specially crafted PostScript file to escape the -dSAFER protection, gain access to the file system and execute arbitrary commands.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=2f2e944c59506de171bbed19cfe38f0ceaea6206
- https://git.alpinelinux.org/aports/commit/?id=44af29fb2c660017489dc72ab3c6712fab60055c
- https://git.alpinelinux.org/aports/commit/?id=8a3efd9a5b28fc17dc6dd75b46cac43cfd1b21bc
- https://git.alpinelinux.org/aports/commit/?id=9096cb46474180811d360209f21d51206ce31580
- https://git.alpinelinux.org/aports/commit/?id=b1c96f0abd38a7ca7a038f9b86dc0534d9d7d3bd