Summary: | PDF interpreter can leave dangerous operators available | ||
---|---|---|---|
Product: | Ghostscript | Reporter: | Ken Sharp <ken.sharp> |
Component: | Security (public) | Assignee: | Chris Liddell (chrisl) <chris.liddell> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | cbuissar, taviso |
Priority: | P4 | ||
Version: | unspecified | ||
Hardware: | PC | ||
OS: | Windows 7 | ||
Customer: | Word Size: | --- |
Description
Ken Sharp
2018-08-27 10:35:47 UTC
Add Tavis to this report as a courtesy, otherwise he won't be able to see it. This very large commit 4b00990640258f464b02ce3f721a22fcb59b289b makes almost all the PDF interpreter functions executeonly, which prevents anyone from reading their contents, and copying any dangerous operators that may be present. There is one case (text redefinitions of basic path construction) where we cna't do this; the reason is an ugly hack for an invalid PDF file. To detect and fix the invalid file, we inspect the path construction operators. If we make them executeonly, then that fails. However, the routines called by those pieces of code are themselves executeonly, so there is no possibility of exploiting them. |