First published: Thu Sep 29 2016(Updated: )
It was found that getenv and filenameforall ignore -dSAFER possibly allowing filesystem enumeration. Upstream bug: <a href="http://bugs.ghostscript.com/show_bug.cgi?id=694724">http://bugs.ghostscript.com/show_bug.cgi?id=694724</a> Upstream patch: <a href="http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ab109aaeb3ddba59518b036fb288402a65cf7ce8">http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ab109aaeb3ddba59518b036fb288402a65cf7ce8</a> Reference: <a href="http://seclists.org/oss-sec/2016/q3/651">http://seclists.org/oss-sec/2016/q3/651</a> Reproducer: %!PS (HOME) getenv { print (\n) print } { (variable not found\n) print } ifelse
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex Ghostscript |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1380327 is categorized as a critical vulnerability due to the potential for filesystem enumeration.
To mitigate REDHAT-BUG-1380327, it is recommended to apply the upstream patch available from the Ghostscript repository.
The vulnerability REDHAT-BUG-1380327 affects Ghostscript software.
Risks associated with REDHAT-BUG-1380327 include unauthorized access to filesystem information, which could lead to data leakage.
A temporary workaround for REDHAT-BUG-1380327 may include disabling the affected functions until a patch is applied.