First published: Wed Nov 27 2019(Updated: )
In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ghostscript | <9.50 | |
redhat 3scale api management | =2.6 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server eus | =7.7 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10216 is a vulnerability in ghostscript before version 9.50 that enables scripts to bypass `-dSAFER` restrictions and escalate privileges.
CVE-2019-10216 has a severity value of 7.8, which is classified as high.
Artifex Ghostscript before version 9.50, Redhat 3scale API Management version 2.6, and various versions of Redhat Enterprise Linux are affected by CVE-2019-10216.
An attacker can exploit CVE-2019-10216 by creating a specially crafted PostScript file that can escalate privileges and access files outside the intended scope.
Yes, you can find more information about CVE-2019-10216 at the following references: [1] http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5b85ddd19 [2] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10216 [3] https://security.gentoo.org/glsa/202004-03