Exposed dangerous method or function in Ghostscript - CVE-2019-3835
Published: April 17, 2019
Vulnerability identifier: #VU18288
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2019-3835
CWE-ID: CWE-749
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Artifex Software, Inc.
Affected software:
Ghostscript
Ghostscript
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due presence of superexec operator within the internal dictionary. A remote attacker can create a specially crafted PDF file, trick the victim into opening, bypass system restrictions of the dSAFER sandbox and access files on the system.
How to mitigate CVE-2019-3835
Install updates from vendor's website.
Sources
- http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html
- https://access.redhat.com/errata/RHSA-2019:0652
- https://bugs.ghostscript.com/show_bug.cgi?id=700585
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3835
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A43SRQAEHQCKSEMIBINHUNIGHTDCZD7F/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANBSCZABXQUEQWIKNWJ35IYX24M227EI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVERLGEU3OV6RNZ2SIBXREWD3BF5H23N/
- https://seclists.org/bugtraq/2019/Apr/4