In Artifex Ghostscript through 9.26, ephemeral or transient procedures can allow access to system operators, leading to remote code execution.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
21 Nov 2024, 04:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00047.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00048.html - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/151307/Ghostscript-Pseudo-Operator-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html - Third Party Advisory, VDB Entry | |
References | () http://www.openwall.com/lists/oss-security/2019/01/23/5 - Exploit, Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2019/03/21/1 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/106700 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHBA-2019:0327 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:0229 - Third Party Advisory | |
References | () https://bugs.chromium.org/p/project-zero/issues/detail?id=1729 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () https://bugs.ghostscript.com/show_bug.cgi?id=700317 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/02/msg00016.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N6T5L3SSJX2AVUPHP7GCPATFWUPKZT2/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWVAVCDXBLPLJMVGNSKGGDTBEOHCJBKK/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVWXVKG72IGEJYHLWE6H3CGALHGFSGGY/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/ - | |
References | () https://seclists.org/bugtraq/2019/Apr/4 - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202004-03 - Third Party Advisory | |
References | () https://usn.ubuntu.com/3866-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2019/dsa-4372 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/46242/ - Exploit, Third Party Advisory, VDB Entry |
07 Nov 2023, 03:13
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-03-21 16:01
Updated : 2024-11-21 04:45
NVD link : CVE-2019-6116
Mitre link : CVE-2019-6116
CVE.ORG link : CVE-2019-6116
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_workstation
artifex
- ghostscript
canonical
- ubuntu_linux
opensuse
- leap
debian
- debian_linux
fedoraproject
- fedora
CWE