跳转到帖子

Oracle Linux: CVE-2024-33870: ELSA-2024-6197: ghostscript security update (MODERATE) (Multiple Advisories)

recommended_posts

发布于
  • Members

Oracle Linux: CVE-2024-33870: ELSA-2024-6197:ghostscript security update (MODERATE) (Multiple Advisories)

Severity
6
CVSS
(AV:L/AC:L/Au:N/C:C/I:N/A:P)
Published
05/16/2024
Created
11/13/2024
Added
10/16/2024
Modified
11/22/2024

Description

An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted. A flaw was found in Ghostscript. When the `gp_validate_path_len` function validates a path, it distinguishes between absolute and relative paths. In the case of relative paths, it will check the path with and without the current-directory-prefix ("foo" and "./foo"). This does not take into account paths with a parent-directory-prefix. Therefore, a path like "../../foo" is also tested as "./../../foo" and if the current directory "./" is in the permitted paths, it will pass the check, which may allow arbitrary file access.

Solution(s)

  • oracle-linux-upgrade-ghostscript
  • oracle-linux-upgrade-ghostscript-doc
  • oracle-linux-upgrade-ghostscript-tools-dvipdf
  • oracle-linux-upgrade-ghostscript-tools-fonts
  • oracle-linux-upgrade-ghostscript-tools-printing
  • oracle-linux-upgrade-ghostscript-x11
  • oracle-linux-upgrade-libgs
  • oracle-linux-upgrade-libgs-devel

References

  • https://attackerkb.com/topics/cve-2024-33870
  • CVE - 2024-33870
  • ELSA-2024-6197
  • 查看数 697
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…