← Retour aux CVEs
CVE-2019-3835
MEDIUM5.5
Description
It was found that the superexec operator was available in the internal dictionary in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
Details CVE
Score CVSS v3.15.5
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurREQUIRED
Publie3/25/2019
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
artifex:ghostscriptdebian:debian_linuxfedoraproject:fedoraopensuse:leapredhat:ansible_towerredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstation
Faiblesses (CWE)
CWE-648CWE-862
References
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html(secalert@redhat.com)
http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html(secalert@redhat.com)
http://www.securityfocus.com/bid/107855(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:0652(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:0971(secalert@redhat.com)
https://bugs.ghostscript.com/show_bug.cgi?id=700585(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3835(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2019/04/msg00021.html(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A43SRQAEHQCKSEMIBINHUNIGHTDCZD7F/(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANBSCZABXQUEQWIKNWJ35IYX24M227EI/(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVERLGEU3OV6RNZ2SIBXREWD3BF5H23N/(secalert@redhat.com)
https://seclists.org/bugtraq/2019/Apr/28(secalert@redhat.com)
https://seclists.org/bugtraq/2019/Apr/4(secalert@redhat.com)
https://security.gentoo.org/glsa/202004-03(secalert@redhat.com)
https://www.debian.org/security/2019/dsa-4432(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/107855(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:0652(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:0971(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.ghostscript.com/show_bug.cgi?id=700585(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3835(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/04/msg00021.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A43SRQAEHQCKSEMIBINHUNIGHTDCZD7F/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANBSCZABXQUEQWIKNWJ35IYX24M227EI/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVERLGEU3OV6RNZ2SIBXREWD3BF5H23N/(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Apr/28(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Apr/4(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202004-03(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4432(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.