A flaw was found in all versions of ghostscript 9.x before 9.50, where the .charkeys
procedure, where it did not properly secure its privileged calls, enabling scripts to bypass -dSAFER
restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges within the Ghostscript and access files outside of restricted areas or execute commands.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ghostscript | Artifex | 9.00 (including) | 9.50 (excluding) |
Red Hat Enterprise Linux 7 | RedHat | ghostscript-0:9.25-2.el7_7.3 | * |
Red Hat Enterprise Linux 8 | RedHat | ghostscript-0:9.25-5.el8_1.1 | * |
Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions | RedHat | ghostscript-0:9.25-2.el8_0.4 | * |
Ghostscript | Ubuntu | bionic | * |
Ghostscript | Ubuntu | devel | * |
Ghostscript | Ubuntu | disco | * |
Ghostscript | Ubuntu | eoan | * |
Ghostscript | Ubuntu | trusty | * |
Ghostscript | Ubuntu | xenial | * |