SB2019041105 - Arch Linux update for ghostscript



SB2019041105 - Arch Linux update for ghostscript

Published: April 11, 2019 Updated: April 21, 2019

Security Bulletin ID SB2019041105
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Medium 33% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Exposed dangerous method or function (CVE-ID: CVE-2019-3835)

The vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due presence of superexec operator within the internal dictionary. A remote attacker can create a specially crafted PDF file, trick the victim into opening, bypass system restrictions of the dSAFER sandbox and access files on the system.

2) OS Command Injection (CVE-ID: CVE-2019-3838)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when processing PostScript files with Ghostscript. A remote attacker can create a specially crafted PDF file, trick the victim to open it and execute arbitrary commands on the affected system.


3) Command Injection (CVE-ID: CVE-2019-6116)

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The vulnerability exists due to leak of sensitive operators on the operand stack when a pseudo-operator pushes a subroutine. A remote unauthenticated attacker can supply a specially crafted PostScript file to escape the -dSAFER protection, gain access to the file system and execute arbitrary commands.


Remediation

Install update from vendor's website.