First published: Mon Dec 03 2018(Updated: )
In Artifex Ghostscript through 9.25, the setpattern operator did not properly validate certain types. A specially crafted PostScript document could exploit this to crash Ghostscript or, possibly, execute arbitrary code in the context of the Ghostscript process. This is a type confusion issue because of failure to check whether the Implementation of a pattern dictionary was a structure type.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex Ghostscript | <=9.25 | |
Debian Debian Linux | =8.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/ghostscript | <9.26 | 9.26 |
debian/ghostscript | 9.27~dfsg-2+deb10u5 9.27~dfsg-2+deb10u9 9.53.3~dfsg-7+deb11u6 9.53.3~dfsg-7+deb11u5 10.0.0~dfsg-11+deb12u2 10.0.0~dfsg-11+deb12u3 10.02.1~dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19134 is a vulnerability in Artifex Ghostscript through 9.25 that allows a specially crafted PostScript document to execute arbitrary code or crash Ghostscript.
The setpattern operator in Artifex Ghostscript through 9.25 can be exploited by a specially crafted PostScript document to crash Ghostscript or execute arbitrary code in the context of the Ghostscript process.
CVE-2018-19134 has a severity score of 7.8, indicating a high severity.
Artifex Ghostscript through 9.25 is affected by CVE-2018-19134.
To mitigate the vulnerability in Artifex Ghostscript, update to version 9.27~dfsg-2+deb10u5 or later.