SB2018112219 - Security restrictions bypass in ghostscript (Alpine package)
Published: November 22, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Security restrictions bypass (CVE-ID: CVE-2018-19475)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The vulnerability exists due to the psi/zdevice2.c source code file fails to check available stack space. A remote unauthenticated attacker can trick the victim into accessing a PostScript file that submits malicious input to bypass the security access restrictions on the targeted system, which could be used to conduct further attacks.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=8a3efd9a5b28fc17dc6dd75b46cac43cfd1b21bc
- https://git.alpinelinux.org/aports/commit/?id=9096cb46474180811d360209f21d51206ce31580
- https://git.alpinelinux.org/aports/commit/?id=b1c96f0abd38a7ca7a038f9b86dc0534d9d7d3bd
- https://git.alpinelinux.org/aports/commit/?id=b0243d03648d68851d3b5edb68da29eaae5c9f0f
- https://git.alpinelinux.org/aports/commit/?id=b38a11ee1f5109ffc2f67afa52903b9437dd4111
- https://git.alpinelinux.org/aports/commit/?id=1effb87543c10d5de5e0a181c6757a0d5cf9e599
- https://git.alpinelinux.org/aports/commit/?id=90f284afbeec1f422dc08dc966719005e5def79a
- https://git.alpinelinux.org/aports/commit/?id=e558a52ec2ce576ebfe50d2acaee3449d1ef6c26