CVSS Base Vector:
The remote host is missing an update for the 'ghostscript'
Linux Distribution Package(s) announced via the CESA-2019:2586 advisory.
Checks if a vulnerable Linux Distribution Package version is present on the target host.
The Ghostscript suite contains utilities for rendering PostScript and PDF
documents. Ghostscript translates PostScript code to common bitmap formats
so that the code can be displayed or printed.
* ghostscript: Safer mode bypass by .forceput exposure in
.pdf_hook_DSC_Creator (701445) (CVE-2019-14811)
* ghostscript: Safer mode bypass by .forceput exposure in setuserparams
* ghostscript: Safer mode bypass by .forceput exposure in setsystemparams
* ghostscript: Safer mode bypass by .forceput exposure in .pdfexectoken and
other procedures (701450) (CVE-2019-14817)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
'ghostscript' Linux Distribution Package(s) on CentOS 7.
Please install the updated Linux Distribution Package(s).
Linux Distribution Package
CentOS Local Security Checks
Find and Fix this Vulnerability:
Mageni can help you to find out if you have this or more vulnerabilities exposing you to hackers, ransomware and malware: Download Mageni's Free Edition
NVD CVE ID: