A flaw was found in all ghostscript versions 9.x before 9.50, in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass -dSAFER
restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ghostscript | Artifex | 9.00 (including) | 9.50 (excluding) |
3scale API Management 2.6 on RHEL 7 | RedHat | 3scale-amp26/3scale-operator:1.9-7 | * |
3scale API Management 2.6 on RHEL 7 | RedHat | 3scale-amp26/apicast-gateway:1.15-9 | * |
3scale API Management 2.6 on RHEL 7 | RedHat | 3scale-amp26/backend:1.9-24 | * |
3scale API Management 2.6 on RHEL 7 | RedHat | 3scale-amp26/operator:1.9-7 | * |
3scale API Management 2.6 on RHEL 7 | RedHat | 3scale-amp26/toolbox:1.2-5 | * |
3scale API Management 2.6 on RHEL 7 | RedHat | 3scale-amp26/zync:1.9-28 | * |
Red Hat Enterprise Linux 7 | RedHat | ghostscript-0:9.25-2.el7_7.2 | * |
Red Hat Enterprise Linux 8 | RedHat | ghostscript-0:9.25-2.el8_0.3 | * |
Ghostscript | Ubuntu | bionic | * |
Ghostscript | Ubuntu | devel | * |
Ghostscript | Ubuntu | disco | * |
Ghostscript | Ubuntu | trusty | * |
Ghostscript | Ubuntu | xenial | * |