First published: Tue Aug 28 2018(Updated: )
In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Artifex Ghostscript | <=9.23 | |
Artifex Gpl Ghostscript | <9.26 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Pulsesecure Pulse Connect Secure | >=8.2r1.0<8.2r12.1 | |
Pulsesecure Pulse Connect Secure | >=8.3r1<8.3r7.1 | |
Pulsesecure Pulse Connect Secure | >=9.0r1<9.0r3.4 | |
redhat/ghostscript | <9.24 | 9.24 |
debian/ghostscript | 9.53.3~dfsg-7+deb11u7 9.53.3~dfsg-7+deb11u9 10.0.0~dfsg-11+deb12u5 10.0.0~dfsg-11+deb12u6 10.04.0~dfsg-1 10.04.0~dfsg-2 |
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=8e9ce5016db968b40e4ec255a3005f2786cce45f
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15911 is a vulnerability in Artifex Ghostscript 9.23 before 2018-08-24 that allows attackers to use uninitialized memory access to crash the interpreter or potentially execute code.
CVE-2018-15911 has a severity score of 7.8, indicating a high severity.
Artifex Ghostscript versions before 9.24 are affected by CVE-2018-15911.
To fix CVE-2018-15911, upgrade to Artifex Ghostscript version 9.24.
More information about CVE-2018-15911 can be found at the following references: [1][2][3].