{"id":"CVE-2019-14812","details":"A flaw was found in all ghostscript versions 9.x before 9.50, in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.","modified":"2026-04-16T04:32:20.467878061Z","published":"2019-11-27T14:15:11.220Z","related":["SUSE-SU-2019:2460-1","SUSE-SU-2019:2478-1","openSUSE-SU-2019:2222-1","openSUSE-SU-2019:2223-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/"},{"type":"WEB","url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=885444fcbe10dc42787ecb76686c8ee4dd33bf33"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/cve-2019-14812"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202004-03"},{"type":"REPORT","url":"https://bugs.ghostscript.com/show_bug.cgi?id=701444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14812"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-14812.json","unresolved_ranges":[{"events":[{"introduced":"9.00"},{"fixed":"9.50"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"9.x"},{"fixed":"9.50"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}