It was found that the superexec operator was available in the internal dictionary in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/107855 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:0652 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0971 Third Party Advisory
https://bugs.ghostscript.com/show_bug.cgi?id=700585 Permissions Required Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3835 Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/04/msg00021.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A43SRQAEHQCKSEMIBINHUNIGHTDCZD7F/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANBSCZABXQUEQWIKNWJ35IYX24M227EI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVERLGEU3OV6RNZ2SIBXREWD3BF5H23N/
https://seclists.org/bugtraq/2019/Apr/28 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Apr/4 Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202004-03 Third Party Advisory
https://www.debian.org/security/2019/dsa-4432 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2019-03-25T18:30:31

Updated: 2020-04-01T21:06:06

Reserved: 2019-01-03T00:00:00


Link: CVE-2019-3835

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2019-03-25T19:29:01.680

Modified: 2023-11-07T03:10:13.353


Link: CVE-2019-3835

JSON object: View

cve-icon Redhat Information

No data.