First published: Mon Sep 10 2018(Updated: )
An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for <a href="https://access.redhat.com/security/cve/CVE-2018-16509">CVE-2018-16509</a>. References: <a href="https://seclists.org/oss-sec/2018/q3/228">https://seclists.org/oss-sec/2018/q3/228</a> <a href="https://seclists.org/oss-sec/2018/q3/229">https://seclists.org/oss-sec/2018/q3/229</a> <a href="https://seclists.org/oss-sec/2018/q3/233">https://seclists.org/oss-sec/2018/q3/233</a> Upstream Patches: <a href="https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=643b24db">https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=643b24db</a> <a href="https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3e5d316b">https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3e5d316b</a> <a href="https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5812b1b7">https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5812b1b7</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ghostscript | <9.25 | 9.25 |
debian/ghostscript | 9.53.3~dfsg-7+deb11u7 9.53.3~dfsg-7+deb11u9 10.0.0~dfsg-11+deb12u6 10.04.0~dfsg-2 | |
Artifex Software Ghostscript | <9.25 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =7.0 |
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5812b1b78fc4d36fdc293b7859de69241140d590
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-16802 is high with a CVSS score of 7.8.
Attackers can exploit CVE-2018-16802 by supplying crafted PostScript to execute code using the "pipe" instruction.
The affected software versions include Artifex Ghostscript before 9.25, and certain versions of Ubuntu, Debian, Canonical Ubuntu Linux, and Red Hat Enterprise Linux Server.
The remedy for CVE-2018-16802 is to update to Ghostscript version 9.25 or later.
You can find more information about CVE-2018-16802 at the following references: [Reference 1](https://seclists.org/oss-sec/2018/q3/228), [Reference 2](http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3e5d316b72e3965b7968bb1d96baa137cd063ac6), [Reference 3](http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=643b24dbd002fb9c131313253c307cf3951b3d47).