Oracle Linux 7 : ghostscript (ELSA-2019-2281)

medium Nessus Plugin ID 180847

Synopsis

The remote Oracle Linux host is missing a security update.

Description

The remote Oracle Linux 7 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2019-2281 advisory.

- Resolves: #1673399 - CVE-2019-3839 ghostscript: missing attack vector protections for CVE-2019-6116
- Resolves: #1678172 - CVE-2019-3835 ghostscript: superexec operator is available (700585)
- Resolves: #1680026 - CVE-2019-3838 ghostscript: forceput in DefineResource is still accessible (700576)
- fix for pdf2dsc regression added to allow fix for CVE-2019-3839
- Resolves: #1621385 - CVE-2018-16511 ghostscript: missing type check in type checker (699659)
- Resolves: #1649722 - CVE-2018-16539 ghostscript: incorrect access checking in temp file handling to disclose contents of files (699658)
- Resolves: #1621162 - CVE-2018-15908 ghostscript: .tempfile file permission issues (699657)
- Resolves: #1621384 - CVE-2018-15909 ghostscript: shading_param incomplete type checking (699660)
- Resolves: #1652902 - CVE-2018-16863 ghostscript: incomplete fix for CVE-2018-16509
- Resolves: #1651150 - CVE-2018-15911 ghostscript: uninitialized memory access in the aesdecode operator (699665)
- Resolves: #1650061 - CVE-2018-16802 ghostscript: Incorrect 'restoration of privilege' checking when running out of stack during exception handling
- Resolves: #1652936 - CVE-2018-19409 ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c
- Resolves: #1654622 - CVE-2018-16541 ghostscript: incorrect free logic in pagedevice replacement (699664)
- Resolves: #1650211 - CVE-2018-17183 ghostscript: User-writable error exception table
- Resolves: #1645517 - CVE-2018-18073 ghostscript: saved execution stacks can leak operator arrays
- Resolves: #1648892 - CVE-2018-17961 ghostscript: saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183)
- Resolves: #1643117 - CVE-2018-18284 ghostscript: 1Policy operator allows a sandbox protection bypass
- Resolves: #1655939 - CVE-2018-19134 ghostscript: Type confusion in setpattern (700141)
- Resolves: #1657334 - CVE-2018-16540 ghostscript: use-after-free in copydevice handling (699661)
- Resolves: #1660570 - CVE-2018-19475 ghostscript: access bypass in psi/zdevice2.c (700153)
- Resolves: #1660829 - CVE-2018-19476 ghostscript: access bypass in psi/zicc.c
- Resolves: #1661279 - CVE-2018-19477 ghostscript: access bypass in psi/zfjbig2.c (700168)
- Resolves: #1667443 - CVE-2019-6116 ghostscript: subroutines within pseudo-operators must themselves be pseudo-operators

Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://linux.oracle.com/errata/ELSA-2019-2281.html

Plugin Details

Severity: Medium

ID: 180847

File Name: oraclelinux_ELSA-2019-2281.nasl

Version: 1.3

Type: local

Agent: unix

Published: 9/7/2023

Updated: 11/1/2024

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2018-11645

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:ghostscript-gtk, p-cpe:/a:oracle:linux:ghostscript-doc, p-cpe:/a:oracle:linux:libgs-devel, cpe:/o:oracle:linux:7, p-cpe:/a:oracle:linux:ghostscript, p-cpe:/a:oracle:linux:ghostscript-cups, p-cpe:/a:oracle:linux:libgs

Required KB Items: Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list, Host/local_checks_enabled

Exploit Ease: No known exploits are available

Patch Publication Date: 8/13/2019

Vulnerability Publication Date: 6/1/2018

Reference Information

CVE: CVE-2018-11645

IAVB: 2021-B-0055-S