First published: Fri Feb 15 2019(Updated: )
It was found that the forceput operator could be extracted from the DefineResource method in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ghostscript | 9.27~dfsg-2+deb10u5 9.27~dfsg-2+deb10u9 9.53.3~dfsg-7+deb11u6 9.53.3~dfsg-7+deb11u5 10.0.0~dfsg-11+deb12u2 10.0.0~dfsg-11+deb12u1 10.02.0~dfsg-2 | |
debian/ghostscript | <=9.26a~dfsg-0+deb9u1<=9.26a~dfsg-2 | 9.27~~dc1~dfsg-1 9.27~dfsg-1 9.26a~dfsg-0+deb9u2 |
redhat/ghostscript | <9.27 | 9.27 |
Artifex Software Ghostscript | <9.27 | |
redhat ansible tower | =3.3 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =7.0 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
openSUSE | =15.0 | |
openSUSE | =42.3 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3838 is a vulnerability in the ghostscript software before version 9.27 that allows a specially crafted PostScript file to have access to the file system outside of the constraints imposed by -dSAFER.
CVE-2019-3838 affects ghostscript versions before 9.27.
The severity of CVE-2019-3838 is high, with a severity value of 5.5.
To fix the CVE-2019-3838 vulnerability, it is recommended to update ghostscript to version 9.27 or later.
You can find more information about CVE-2019-3838 on the official ghostscript bug tracker at https://bugs.ghostscript.com/show_bug.cgi?id=700576 and the Redhat security advisory at https://access.redhat.com/security/cve/CVE-2018-16509.