First published: Thu Sep 29 2016(Updated: )
It was found that getenv and filenameforall ignore -dSAFER possibly allowing filesystem enumeration. Upstream bug: <a href="http://bugs.ghostscript.com/show_bug.cgi?id=694724">http://bugs.ghostscript.com/show_bug.cgi?id=694724</a> Upstream patch: <a href="http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ab109aaeb3ddba59518b036fb288402a65cf7ce8">http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ab109aaeb3ddba59518b036fb288402a65cf7ce8</a> Reference: <a href="http://seclists.org/oss-sec/2016/q3/651">http://seclists.org/oss-sec/2016/q3/651</a> Reproducer: %!PS (HOME) getenv { print (\n) print } { (variable not found\n) print } ifelse
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ghostscript | =9.10 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5653 has a high severity rating due to its potential for filesystem enumeration.
CVE-2013-5653 affects Ghostscript version 9.10.
To fix CVE-2013-5653, you should upgrade to a version of Ghostscript that includes the relevant security patches.
The main issue with CVE-2013-5653 is that certain functions are ignoring security settings, allowing unauthorized filesystem access.
The Debian GNU/Linux version 8.0 is mentioned as being affected by CVE-2013-5653.