First published: Mon Sep 10 2018(Updated: )
An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for <a href="https://access.redhat.com/security/cve/CVE-2018-16509">CVE-2018-16509</a>. References: <a href="https://seclists.org/oss-sec/2018/q3/228">https://seclists.org/oss-sec/2018/q3/228</a> <a href="https://seclists.org/oss-sec/2018/q3/229">https://seclists.org/oss-sec/2018/q3/229</a> <a href="https://seclists.org/oss-sec/2018/q3/233">https://seclists.org/oss-sec/2018/q3/233</a> Upstream Patches: <a href="https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=643b24db">https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=643b24db</a> <a href="https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3e5d316b">https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3e5d316b</a> <a href="https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5812b1b7">https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5812b1b7</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ghostscript | <9.25 | 9.25 |
debian/ghostscript | 9.53.3~dfsg-7+deb11u7 9.53.3~dfsg-7+deb11u9 10.0.0~dfsg-11+deb12u6 10.04.0~dfsg-2 | |
Ghostscript | <9.25 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Workstation | =7.0 |
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5812b1b78fc4d36fdc293b7859de69241140d590
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-16802 is high with a CVSS score of 7.8.
Attackers can exploit CVE-2018-16802 by supplying crafted PostScript to execute code using the "pipe" instruction.
The affected software versions include Artifex Ghostscript before 9.25, and certain versions of Ubuntu, Debian, Canonical Ubuntu Linux, and Red Hat Enterprise Linux Server.
The remedy for CVE-2018-16802 is to update to Ghostscript version 9.25 or later.
You can find more information about CVE-2018-16802 at the following references: [Reference 1](https://seclists.org/oss-sec/2018/q3/228), [Reference 2](http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3e5d316b72e3965b7968bb1d96baa137cd063ac6), [Reference 3](http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=643b24dbd002fb9c131313253c307cf3951b3d47).