Amazon Linux AMI : ghostscript (ALAS-2017-784)

critical Nessus Plugin ID 96395

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

It was found that the ghostscript functions getenv, filenameforall and .libfile did not honor the -dSAFER option, usually used when processing untrusted documents, leading to information disclosure. A specially crafted postscript document could read environment variable, list directory and retrieve file content respectively, from the target. (CVE-2013-5653 , CVE-2016-7977)

It was found that the ghostscript function .initialize_dsc_parser did not validate its parameter before using it, allowing a type confusion flaw. A specially crafted postscript document could cause a crash code execution in the context of the gs process. (CVE-2016-7979)

It was found that ghostscript did not sufficiently check the validity of parameters given to the .sethalftone5 function. A specially crafted postscript document could cause a crash, or execute arbitrary code in the context of the gs process. (CVE-2016-8602)

Solution

Run 'yum update ghostscript' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2017-784.html

Plugin Details

Severity: Critical

ID: 96395

File Name: ala_ALAS-2017-784.nasl

Version: 3.7

Type: local

Agent: unix

Published: 1/11/2017

Updated: 4/18/2018

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:ghostscript-devel, p-cpe:/a:amazon:linux:ghostscript-doc, p-cpe:/a:amazon:linux:ghostscript, p-cpe:/a:amazon:linux:ghostscript-debuginfo, cpe:/o:amazon:linux

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 1/10/2017

Reference Information

CVE: CVE-2013-5653, CVE-2016-7977, CVE-2016-7979, CVE-2016-8602

ALAS: 2017-784