Rapid7 Vulnerability & Exploit Database

RHSA-2003:181: Updated ghostscript packages fix vulnerability

Back to Search

RHSA-2003:181: Updated ghostscript packages fix vulnerability

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
06/16/2003
Created
07/25/2018
Added
10/28/2005
Modified
07/04/2017

Description

New ghostscript packages fixing a command execution vulnerability are now available.

GNU Ghostscript is an interpreter for the PostScript language, and is often used when printing to printers that do not have their own built-in PostScript interpreter. A flaw in unpatched versions of Ghostscript before 7.07 allows malicious postscript files to execute arbitrary commands even with -dSAFER enabled. Note that this vulnerability does not affect Ghostscript when the Red Hat -dPARANOIDSAFER option is used. Therefore, a malicious print job cannot be used to exploit this vulnerability under Red Hat Linux. Users of Ghostscript are advised to upgrade to these updated packages, which contain a backported patch and are not vulnerable to this issue.

Solution(s)

  • redhat-upgrade-ghostscript
  • redhat-upgrade-ghostscript-devel
  • redhat-upgrade-ghostscript-gtk
  • redhat-upgrade-hpijs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;