SB2019041105 - Arch Linux update for ghostscript
Published: April 11, 2019 Updated: April 21, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Exposed dangerous method or function (CVE-ID: CVE-2019-3835)
2) OS Command Injection (CVE-ID: CVE-2019-3838)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing PostScript files with Ghostscript. A remote attacker can create a specially crafted PDF file, trick the victim to open it and execute arbitrary commands on the affected system.
3) Command Injection (CVE-ID: CVE-2019-6116)
The vulnerability allows a remote attacker to execute arbitrary commands on the target system.
The vulnerability exists due to leak of sensitive operators on the operand stack when a pseudo-operator pushes a subroutine. A remote unauthenticated attacker can supply a specially crafted PostScript file to escape the -dSAFER protection, gain access to the file system and execute arbitrary commands.
Remediation
Install update from vendor's website.