what you don't know can hurt you

Ubuntu Security Notice USN-4193-1

Ubuntu Security Notice USN-4193-1
Posted Nov 15, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4193-1 - Paul Manfred and Lukas Schauer discovered that Ghostscript incorrectly handled certain PostScript files. If a user or automated system were tricked into processing a specially crafted file, a remote attacker could possibly use this issue to access arbitrary files, execute arbitrary code, or cause a denial of service.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2019-14869
MD5 | 4d26777cb9ff426bb18a110b0c3ac708

Ubuntu Security Notice USN-4193-1

Change Mirror Download
==========================================================================
Ubuntu Security Notice USN-4193-1
November 14, 2019

ghostscript vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.10
- Ubuntu 19.04
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Ghostscript could be made to crash, access files, or run programs if it
opened a specially crafted file.

Software Description:
- ghostscript: PostScript and PDF interpreter

Details:

Paul Manfred and Lukas Schauer discovered that Ghostscript incorrectly
handled certain PostScript files. If a user or automated system were
tricked into processing a specially crafted file, a remote attacker could
possibly use this issue to access arbitrary files, execute arbitrary code,
or cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
ghostscript 9.27~dfsg+0-0ubuntu3.1
libgs9 9.27~dfsg+0-0ubuntu3.1

Ubuntu 19.04:
ghostscript 9.26~dfsg+0-0ubuntu7.4
libgs9 9.26~dfsg+0-0ubuntu7.4

Ubuntu 18.04 LTS:
ghostscript 9.26~dfsg+0-0ubuntu0.18.04.12
libgs9 9.26~dfsg+0-0ubuntu0.18.04.12

Ubuntu 16.04 LTS:
ghostscript 9.26~dfsg+0-0ubuntu0.16.04.12
libgs9 9.26~dfsg+0-0ubuntu0.16.04.12

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4193-1
CVE-2019-14869

Package Information:
https://launchpad.net/ubuntu/+source/ghostscript/9.27~dfsg+0-0ubuntu3.1
https://launchpad.net/ubuntu/+source/ghostscript/9.26~dfsg+0-0ubuntu7.4
https://launchpad.net/ubuntu/+source/ghostscript/9.26~dfsg+0-0ubuntu0.18.04.12
https://launchpad.net/ubuntu/+source/ghostscript/9.26~dfsg+0-0ubuntu0.16.04.12

Comments (1)

RSS Feed Subscribe to this comment feed
maxwell123

I am a Certified Hacking and Security (CHS) Expert, that needs no further explanation. You can help yourself by contacting me on (wisetechhacker @gmail.com) or Whatsap[p::+1{917}5085328
 if you need quick access to a suspected cheating partner's phone, whatsapp, email accounts, instagram, and other social media accounts.I also use my knowledgeable and skill sets to help people boost their low credit scores to high dependable and reasonable scores.

Comment by maxwell123
2019-11-15 18:13:41 UTC | Permalink | Reply
Login or Register to post a comment

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    1 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    12 Files
  • 13
    Feb 13th
    18 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    19 Files
  • 20
    Feb 20th
    20 Files
  • 21
    Feb 21st
    11 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close