SB2019020721 - Fedora 29 update for ghostscript
Published: February 7, 2019 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2018-19478)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can trick the victim into processing a specially crafted PDF file and trigger an extremely long running computation.
2) Type confusion (CVE-ID: CVE-2018-19134)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to missing type check in line 292 of zcolor.c. A remote unauthenticated attacker can trigger memory corruption and execute code using the "pipe" instruction.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Type confusion (CVE-ID: CVE-2018-19477)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The vulnerability exists due to a JBIG2Decode type confusion condition in the psi/zfjbig2.csource code file. A remote unauthenticated attacker can trick the victim into accessing a PostScript file that submits malicious input to bypass the security access restrictions on the targeted system, which could be used to conduct further attacks.
4) Type confusion (CVE-ID: CVE-2018-19476)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The vulnerability exists due to a setcolorspace type confusion condition in the psi/zicc.c source code file. A remote unauthenticated attacker can trick the victim into accessing a PostScript file that submits malicious input to bypass the security access restrictions on the targeted system, which could be used to conduct further attacks.
5) Security restrictions bypass (CVE-ID: CVE-2018-19475)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The vulnerability exists due to the psi/zdevice2.c source code file fails to check available stack space. A remote unauthenticated attacker can trick the victim into accessing a PostScript file that submits malicious input to bypass the security access restrictions on the targeted system, which could be used to conduct further attacks.
6) Security restrictions bypass (CVE-ID: CVE-2018-19409)
The vulnerability allows a local attacker to bypass security restrictions on the target system.
The vulnerability exists due to improper checks of the LockSafetyParams device parameter if another device is used as the top device. A local attacker can make a .setdevice call and bypass security restrictions If another device, such as the pdf14 compositor, is the top device on the system.
7) Code injection (CVE-ID: CVE-2018-18284)
The vulnerability allows a remote attacker to bypass the sandbox protection mechanism on the target system.
The vulnerability exists due to the failure of the sandbox protection mechanism of the affected software when the 1Policy operator is used. A remote unauthenticated attacker can trick the victim into accessing a PostScript file that submits malicious input, bypass the sandbox protection mechanism and modify or replace error handlers used by the software, which the attacker could use to inject and execute arbitrary code on the system.
8) Security restrictions bypass (CVE-ID: CVE-2018-18073)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to exposure of system operators in the saved execution stack in an error object. A remote attacker can bypass a sandbox protection mechanism to conduct further attacks.
9) Code Injection (CVE-ID: CVE-2018-17961)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation that allows sandbox bypass via error handler setup vectors. A remote attacker can pass a specially crafted PostScript file to the affected application, inject and execute arbitrary code on the target system.
Note: this vulnerability exists due to insufficient patch for previously fixed Code injection vulnerability (CVE-2018-17183).
10) Code Injection (CVE-ID: CVE-2018-17183)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to the application allowed a user-writable error exception table. A remote attacker can use a specially crafted PostScript file to overwrite error handlers and inject arbitrary code.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.