SB2019091922 - Fedora 30 update for ghostscript 



SB2019091922 - Fedora 30 update for ghostscript

Published: September 19, 2019 Updated: June 20, 2025

Security Bulletin ID SB2019091922
Severity
High
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 17% Low 83%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-14811)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to unrestricted access to .forceput in .pdf_hook_DSC_Creator. A remote attacker can create a specially crafted PDF file, trick the victim to open it and gain access to arbitrary files on the system.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-14812)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to unrestricted access to .forceput in setuserparams. A remote attacker can create a specially crafted PDF file, trick the victim to open it and gain access to arbitrary files on the system.


3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-14813)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to unrestricted access to .forceput in setuserparams. A remote attacker can create a specially crafted PDF file, trick the victim to open it and gain access to arbitrary files on the system.


4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-14817)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to unrestricted access to .forceput in setuserparams. A remote attacker can create a specially crafted PDF file, trick the victim to open it and gain access to arbitrary files on the system.


5) Buffer overflow (CVE-ID: CVE-2019-3839)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing Postsccript files within the GPL PostScript/PDF interpreter. A remote attacker can create a specially crafted Postscript document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


6) Command Injection (CVE-ID: CVE-2019-6116)

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The vulnerability exists due to leak of sensitive operators on the operand stack when a pseudo-operator pushes a subroutine. A remote unauthenticated attacker can supply a specially crafted PostScript file to escape the -dSAFER protection, gain access to the file system and execute arbitrary commands.


Remediation

Install update from vendor's website.