CVE-2019-6116

Related Vulnerabilities: CVE-2019-6116  

Impact: Important Public Date: 2019-01-23 Bugzilla: 1666636: CVE-2019-6116 ghostscript: subroutines within pseudo-operators must themselves be pseudo-operators (700317) It was found that ghostscript could leak sensitive operators on the operand stack when a pseudo-operator pushes a subroutine. A specially crafted PostScript file could use this flaw to escape the -dSAFER protection in order to, for example, have access to the file system and execute commands.

It was found that ghostscript could leak sensitive operators on the operand stack when a pseudo-operator pushes a subroutine. A specially crafted PostScript file could use this flaw to escape the -dSAFER protection in order to, for example, have access to the file system and execute commands.

Find out more about CVE-2019-6116 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

CVSS v3 metrics

CVSS3 Base Score 7.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Low
Integrity Impact Low
Availability Impact Low

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (ghostscript) RHSA-2019:0229 2019-01-31

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 6 ghostscript Will not fix
Red Hat Enterprise Linux 5 ghostscript Will not fix

Acknowledgements

Red Hat would like to thank Tavis Ormandy (Google Project Zero) for reporting this issue.

Mitigation

Please refer to the "Mitigation" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509

External References