An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for CVE-2018-16509.
References
Link | Resource |
---|---|
https://seclists.org/oss-sec/2018/q3/229 | Mailing List Third Party Advisory |
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=643b24dbd002fb9c131313253c307cf3951b3d47 | Third Party Advisory |
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3e5d316b72e3965b7968bb1d96baa137cd063ac6 | Third Party Advisory |
https://seclists.org/oss-sec/2018/q3/228 | Mailing List Third Party Advisory |
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5812b1b78fc4d36fdc293b7859de69241140d590 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2018/dsa-4294 | Third Party Advisory |
https://usn.ubuntu.com/3768-1/ | Third Party Advisory |
https://security.gentoo.org/glsa/201811-12 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:3834 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2018-09-10 09:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-16802
Mitre link : CVE-2018-16802
JSON object : View
CWE
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_tus
- enterprise_linux_server_eus
- enterprise_linux_server
artifex
- ghostscript
canonical
- ubuntu_linux
debian
- debian_linux