An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for CVE-2018-16509.
References
Link | Resource |
---|---|
http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=3e5d316b72e3965b7968bb1d96baa137cd063ac6 | |
http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=643b24dbd002fb9c131313253c307cf3951b3d47 | |
https://access.redhat.com/errata/RHSA-2018:3834 | Third Party Advisory |
https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=5812b1b78fc4d36fdc293b7859de69241140d590 | |
https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html | Mailing List Third Party Advisory |
https://seclists.org/oss-sec/2018/q3/228 | Mailing List Third Party Advisory |
https://seclists.org/oss-sec/2018/q3/229 | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201811-12 | Third Party Advisory |
https://usn.ubuntu.com/3768-1/ | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4294 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2018-09-10 16:29
Updated : 2023-11-07 02:53
NVD link : CVE-2018-16802
Mitre link : CVE-2018-16802
CVE.ORG link : CVE-2018-16802
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_server_aus
- enterprise_linux_desktop
- enterprise_linux_server_eus
- enterprise_linux_workstation
- enterprise_linux_server_tus
artifex
- ghostscript
canonical
- ubuntu_linux
debian
- debian_linux
CWE