First published: Tue Nov 05 2019(Updated: )
A flaw was found in all versions of ghostscript 9.x before 9.50, where the `.charkeys` procedure, where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges within the Ghostscript and access files outside of restricted areas or execute commands.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ghostscript | <9.50 | 9.50 |
Ghostscript | >=9.00<9.50 | |
Fedora | =29 | |
Fedora | =30 | |
Fedora | =31 | |
SUSE Linux | =15.0 | |
SUSE Linux | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-14869.
The severity of CVE-2019-14869 is high.
The affected software is Artifex Ghostscript version 9.x before 9.50, Fedoraproject Fedora versions 29, 30, and 31, openSUSE Leap versions 15.0 and 15.1.
An attacker can exploit CVE-2019-14869 by creating a specially crafted PostScript file that could bypass `-dSAFER` restrictions.
The remedy for CVE-2019-14869 is to update to version 9.50 of Artifex Ghostscript.