diff --git a/2019/10xxx/CVE-2019-10216.json b/2019/10xxx/CVE-2019-10216.json index 7337b90e73a..a79cbe64e6b 100644 --- a/2019/10xxx/CVE-2019-10216.json +++ b/2019/10xxx/CVE-2019-10216.json @@ -19,7 +19,8 @@ "version": { "version_data": [ { - "version_value": "9.50" + "version_value": "9.50", + "version_affected": "<" } ] } @@ -48,6 +49,11 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10216", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10216", "refsource": "CONFIRM" + }, + { + "url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5b85ddd19", + "name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5b85ddd19", + "refsource": "CONFIRM" } ] }, @@ -55,7 +61,7 @@ "description_data": [ { "lang": "eng", - "value": "It was found that the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas." + "value": "It was found that in ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas." } ] },