Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2019-14817: CVE-2019-14817 ghostscript: Safer mode bypass by .forceput exposure in .pdfexectoken and other procedures (701450) (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Red Hat: CVE-2019-14817: CVE-2019-14817 ghostscript: Safer mode bypass by .forceput exposure in .pdfexectoken and other procedures (701450) (Multiple Advisories)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
09/02/2019
Created
09/04/2019
Added
09/03/2019
Modified
12/15/2023

Description

A flaw was found in, ghostscript versions prior to 9.50, in the .pdfexectoken and other procedures where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

Solution(s)

  • redhat-upgrade-ghostscript
  • redhat-upgrade-ghostscript-cups
  • redhat-upgrade-ghostscript-debuginfo
  • redhat-upgrade-ghostscript-debugsource
  • redhat-upgrade-ghostscript-doc
  • redhat-upgrade-ghostscript-gtk
  • redhat-upgrade-ghostscript-gtk-debuginfo
  • redhat-upgrade-ghostscript-tools-dvipdf
  • redhat-upgrade-ghostscript-tools-fonts
  • redhat-upgrade-ghostscript-tools-printing
  • redhat-upgrade-ghostscript-x11
  • redhat-upgrade-ghostscript-x11-debuginfo
  • redhat-upgrade-libgs
  • redhat-upgrade-libgs-debuginfo
  • redhat-upgrade-libgs-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;