ID CVE-2019-14817
Summary A flaw was found in, ghostscript versions prior to 9.50, in the .pdfexectoken and other procedures where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
References
Vulnerable Configurations
  • cpe:2.3:a:artifex:ghostscript:-:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:-:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:8_64:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:8_64:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.00:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.00:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.01:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.01:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.02:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.02:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.04:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.04:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.05:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.05:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.06:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.06:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.07:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.07:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.09:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.09:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.10:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.10:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.14:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.14:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.15:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.15:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.16:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.16:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.18:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.18:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.19:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.19:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.22:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.22:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.23:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.23:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.24:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.24:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.25:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.25:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.26:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.26:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.27:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.27:*:*:*:*:*:*:*
  • cpe:2.3:a:artifex:ghostscript:9.28:*:*:*:*:*:*:*
    cpe:2.3:a:artifex:ghostscript:9.28:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 16-10-2020 - 13:21)
Impact:
Exploitability:
CWE CWE-863
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
redhat via4
advisories
  • bugzilla
    id 1744042
    title CVE-2019-14817 ghostscript: Safer mode bypass by .forceput exposure in .pdfexectoken and other procedures (701450)
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 7 is installed
        oval oval:com.redhat.rhba:tst:20150364027
      • OR
        • AND
          • comment ghostscript is earlier than 0:9.25-2.el7_7.2
            oval oval:com.redhat.rhsa:tst:20192586001
          • comment ghostscript is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20120095009
        • AND
          • comment ghostscript-cups is earlier than 0:9.25-2.el7_7.2
            oval oval:com.redhat.rhsa:tst:20192586003
          • comment ghostscript-cups is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20170013004
        • AND
          • comment ghostscript-doc is earlier than 0:9.25-2.el7_7.2
            oval oval:com.redhat.rhsa:tst:20192586005
          • comment ghostscript-doc is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20120095013
        • AND
          • comment ghostscript-gtk is earlier than 0:9.25-2.el7_7.2
            oval oval:com.redhat.rhsa:tst:20192586007
          • comment ghostscript-gtk is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20120095015
        • AND
          • comment libgs is earlier than 0:9.25-2.el7_7.2
            oval oval:com.redhat.rhsa:tst:20192586009
          • comment libgs is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20190971016
        • AND
          • comment libgs-devel is earlier than 0:9.25-2.el7_7.2
            oval oval:com.redhat.rhsa:tst:20192586011
          • comment libgs-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20190971018
    rhsa
    id RHSA-2019:2586
    released 2019-09-02
    severity Important
    title RHSA-2019:2586: ghostscript security update (Important)
  • bugzilla
    id 1744042
    title CVE-2019-14817 ghostscript: Safer mode bypass by .forceput exposure in .pdfexectoken and other procedures (701450)
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 8 is installed
        oval oval:com.redhat.rhba:tst:20193384074
      • OR
        • AND
          • comment ghostscript is earlier than 0:9.25-2.el8_0.3
            oval oval:com.redhat.rhsa:tst:20192591001
          • comment ghostscript is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20120095009
        • AND
          • comment ghostscript-debugsource is earlier than 0:9.25-2.el8_0.3
            oval oval:com.redhat.rhsa:tst:20192591003
          • comment ghostscript-debugsource is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20190971004
        • AND
          • comment ghostscript-doc is earlier than 0:9.25-2.el8_0.3
            oval oval:com.redhat.rhsa:tst:20192591005
          • comment ghostscript-doc is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20120095013
        • AND
          • comment ghostscript-tools-dvipdf is earlier than 0:9.25-2.el8_0.3
            oval oval:com.redhat.rhsa:tst:20192591007
          • comment ghostscript-tools-dvipdf is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20190971008
        • AND
          • comment ghostscript-tools-fonts is earlier than 0:9.25-2.el8_0.3
            oval oval:com.redhat.rhsa:tst:20192591009
          • comment ghostscript-tools-fonts is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20190971010
        • AND
          • comment ghostscript-tools-printing is earlier than 0:9.25-2.el8_0.3
            oval oval:com.redhat.rhsa:tst:20192591011
          • comment ghostscript-tools-printing is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20190971012
        • AND
          • comment ghostscript-x11 is earlier than 0:9.25-2.el8_0.3
            oval oval:com.redhat.rhsa:tst:20192591013
          • comment ghostscript-x11 is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20190971014
        • AND
          • comment libgs is earlier than 0:9.25-2.el8_0.3
            oval oval:com.redhat.rhsa:tst:20192591015
          • comment libgs is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20190971016
        • AND
          • comment libgs-devel is earlier than 0:9.25-2.el8_0.3
            oval oval:com.redhat.rhsa:tst:20192591017
          • comment libgs-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20190971018
    rhsa
    id RHSA-2019:2591
    released 2019-09-02
    severity Important
    title RHSA-2019:2591: ghostscript security update (Important)
  • rhsa
    id RHBA-2019:2824
  • rhsa
    id RHSA-2019:2594
rpms
  • ghostscript-0:9.25-2.el7_7.2
  • ghostscript-cups-0:9.25-2.el7_7.2
  • ghostscript-debuginfo-0:9.25-2.el7_7.2
  • ghostscript-doc-0:9.25-2.el7_7.2
  • ghostscript-gtk-0:9.25-2.el7_7.2
  • libgs-0:9.25-2.el7_7.2
  • libgs-devel-0:9.25-2.el7_7.2
  • ghostscript-0:9.25-2.el8_0.3
  • ghostscript-debuginfo-0:9.25-2.el8_0.3
  • ghostscript-debugsource-0:9.25-2.el8_0.3
  • ghostscript-doc-0:9.25-2.el8_0.3
  • ghostscript-gtk-debuginfo-0:9.25-2.el8_0.3
  • ghostscript-tools-dvipdf-0:9.25-2.el8_0.3
  • ghostscript-tools-fonts-0:9.25-2.el8_0.3
  • ghostscript-tools-printing-0:9.25-2.el8_0.3
  • ghostscript-x11-0:9.25-2.el8_0.3
  • ghostscript-x11-debuginfo-0:9.25-2.el8_0.3
  • libgs-0:9.25-2.el8_0.3
  • libgs-debuginfo-0:9.25-2.el8_0.3
  • libgs-devel-0:9.25-2.el8_0.3
refmap via4
bugtraq 20190910 [SECURITY] [DSA 4518-1] ghostscript security update
confirm
debian DSA-4518
fedora
  • FEDORA-2019-0a9d525d71
  • FEDORA-2019-953fc0f16d
  • FEDORA-2019-ebd6c4f15a
gentoo GLSA-202004-03
mlist [debian-lts-announce] 20190909 [SECURITY] [DLA 1915-1] ghostscript security update
suse
  • openSUSE-SU-2019:2222
  • openSUSE-SU-2019:2223
Last major update 16-10-2020 - 13:21
Published 03-09-2019 - 16:15
Last modified 16-10-2020 - 13:21
Back to Top