Vulnerability in Ghostscript allowing code to be executed when a PostScript document is opened

In Ghostscript, a suite of tools for processing, converting, and generating PostScript and PDF documents, identified vulnerability (CVE-2020-15900), which can cause files to be modified and arbitrary commands to be run when specially formatted PostScript documents are opened. Using a non-standard PostScript statement in a document search allows you to cause an overflow of the uint32_t type when calculating the size, overwrite memory areas outside the allocated buffer and access files in the FS, which can be used to organize an attack to execute arbitrary code in the system (for example, by adding commands to ~/.bashrc or ~/. profile).

The problem affects issues from 9.50 to 9.52 (error present since release 9.28rc1, but According to researchers who discovered the vulnerability, appears from version 9.50).

Fix proposed in release 9.52.1 (patch). Hotfix package updates have already been released for Debian, Ubuntu, SUSE. Packages in RHEL problems are not affected.

Recall that the vulnerabilities in Ghostscript pose an increased risk, since this package is used in many popular applications for processing PostScript and PDF formats. For example, Ghostscript is called when creating desktop thumbnails, when indexing data in the background, and when converting images. For a successful attack, in many cases, simply downloading the exploit file or browsing the directory with it in Nautilus is enough. Vulnerabilities in Ghostscript can also be exploited through image processors based on the ImageMagick and GraphicsMagick packages by passing them a JPEG or PNG file that contains PostScript code instead of an image (such a file will be processed in Ghostscript, since the MIME type is recognized by the content, and without relying on the extension).

Source: opennet.ru

Add a comment