CVE-2019-10216
Publication date 12 August 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas.
From the Ubuntu Security Team
Netanel Fisher discovered that the font handler in Ghostscript did not properly restrict privileged calls when '-dSAFER' restrictions were in effect. If a user or automated system were tricked into processing a specially crafted file, a remote attacker could possibly use this issue to access arbitrary files.
Status
Package | Ubuntu Release | Status |
---|---|---|
ghostscript | ||
18.04 LTS bionic |
Fixed 9.26~dfsg+0-0ubuntu0.18.04.10
|
|
16.04 LTS xenial |
Fixed 9.26~dfsg+0-0ubuntu0.16.04.10
|
|
14.04 LTS trusty | Not in release |
Patch details
Package | Patch details |
---|---|
ghostscript |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 · High |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4092-1
- Ghostscript vulnerability
- 12 August 2019