vulnerability
Amazon Linux 2023: CVE-2024-33870: Medium priority package update for ghostscript
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:L/AC:L/Au:N/C:C/I:N/A:P) | 2024-05-16 | 2025-02-17 | 2025-02-17 |
Severity
6
CVSS
(AV:L/AC:L/Au:N/C:C/I:N/A:P)
Published
2024-05-16
Added
2025-02-17
Modified
2025-02-17
Description
An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.
A flaw was found in Ghostscript. When the `gp_validate_path_len` function validates a path, it distinguishes between absolute and relative paths. In the case of relative paths, it will check the path with and without the current-directory-prefix ("foo" and "./foo"). This does not take into account paths with a parent-directory-prefix. Therefore, a path like "../../foo" is also tested as "./../../foo" and if the current directory "./" is in the permitted paths, it will pass the check, which may allow arbitrary file access.
A flaw was found in Ghostscript. When the `gp_validate_path_len` function validates a path, it distinguishes between absolute and relative paths. In the case of relative paths, it will check the path with and without the current-directory-prefix ("foo" and "./foo"). This does not take into account paths with a parent-directory-prefix. Therefore, a path like "../../foo" is also tested as "./../../foo" and if the current directory "./" is in the permitted paths, it will pass the check, which may allow arbitrary file access.
Solution(s)
amazon-linux-2023-upgrade-ghostscriptamazon-linux-2023-upgrade-ghostscript-debuginfoamazon-linux-2023-upgrade-ghostscript-debugsourceamazon-linux-2023-upgrade-ghostscript-docamazon-linux-2023-upgrade-ghostscript-gtkamazon-linux-2023-upgrade-ghostscript-gtk-debuginfoamazon-linux-2023-upgrade-ghostscript-tools-dvipdfamazon-linux-2023-upgrade-ghostscript-tools-fontsamazon-linux-2023-upgrade-ghostscript-tools-printingamazon-linux-2023-upgrade-ghostscript-x11amazon-linux-2023-upgrade-ghostscript-x11-debuginfoamazon-linux-2023-upgrade-libgsamazon-linux-2023-upgrade-libgs-debuginfoamazon-linux-2023-upgrade-libgs-devel

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.