Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2019-14817: CVE-2019-14817 ghostscript: Safer mode bypass by .forceput exposure in .pdfexectoken and other procedures (701450) (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Red Hat: CVE-2019-14817: CVE-2019-14817 ghostscript: Safer mode bypass by .forceput exposure in .pdfexectoken and other procedures (701450) (Multiple Advisories)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
09/02/2019
Created
09/04/2019
Added
09/03/2019
Modified
11/27/2024

Description

A flaw was found in, ghostscript versions prior to 9.50, in the .pdfexectoken and other procedures where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

Solution(s)

  • redhat-upgrade-ghostscript
  • redhat-upgrade-ghostscript-cups
  • redhat-upgrade-ghostscript-debuginfo
  • redhat-upgrade-ghostscript-debugsource
  • redhat-upgrade-ghostscript-doc
  • redhat-upgrade-ghostscript-gtk
  • redhat-upgrade-ghostscript-gtk-debuginfo
  • redhat-upgrade-ghostscript-tools-dvipdf
  • redhat-upgrade-ghostscript-tools-fonts
  • redhat-upgrade-ghostscript-tools-printing
  • redhat-upgrade-ghostscript-x11
  • redhat-upgrade-ghostscript-x11-debuginfo
  • redhat-upgrade-libgs
  • redhat-upgrade-libgs-debuginfo
  • redhat-upgrade-libgs-devel

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;