Summary: | -dSAFER bypass | ||
---|---|---|---|
Product: | Ghostscript | Reporter: | Arkadiy Tetelman <ghostscript> |
Component: | Security (public) | Assignee: | Chris Liddell (chrisl) <chris.liddell> |
Status: | RESOLVED FIXED | ||
Severity: | critical | CC: | cbuissar, dr, ghostscript, jens.a.mueller, jsmeix, mosvald, till.kamppeter |
Priority: | P4 | ||
Version: | unspecified | ||
Hardware: | PC | ||
OS: | Linux | ||
Customer: | Word Size: | --- | |
Attachments: |
Malicious pdf
Decompressed version with a less invasive payload |
Description
Arkadiy Tetelman
2018-11-14 02:45:17 UTC
Created attachment 16187 [details]
Decompressed version with a less invasive payload
It doesn't seem fixed to me - we built off of 965a557 and ghostscript no longer executes your uncompressed PoC (ltr_61435b3cbc5676fa-uc.pdf) but still *does* execute our original PoC (ltr_61435b3cbc5676fa.pdf) (In reply to Arkadiy Tetelman from comment #3) > It doesn't seem fixed to me - we built off of 965a557 and ghostscript no > longer executes your uncompressed PoC (ltr_61435b3cbc5676fa-uc.pdf) but > still *does* execute our original PoC (ltr_61435b3cbc5676fa.pdf) Yes, the fix was incomplete - a subtlety I missed the first time around. I have a solution, but I want to discuss it with one of my colleagues before committing it. The commit linked above, and then this commit: http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=ea1b3ef437 fix this issue. Confirmed! Thank you for the speedy fix This is CVE-2018-19409 |