First published: Thu Sep 06 2018(Updated: )
An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. References: <a href="http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=1497d65039885a52b598b137dd8622bd4672f9be">http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=1497d65039885a52b598b137dd8622bd4672f9be</a> <a href="http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=971472c83a345a16dac9f90f91258bb22dd77f22">http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=971472c83a345a16dac9f90f91258bb22dd77f22</a> <a href="https://seclists.org/oss-sec/2018/q3/182">https://seclists.org/oss-sec/2018/q3/182</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ghostscript | <9.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1626193 is considered critical due to its potential to cause memory corruption.
To fix REDHAT-BUG-1626193, upgrade to the latest version of Artifex Ghostscript that is higher than 9.24.
Users of Artifex Ghostscript versions prior to 9.24 are affected by REDHAT-BUG-1626193.
REDHAT-BUG-1626193 allows remote attackers to exploit crafted PostScript files, potentially leading to arbitrary code execution.
There is no specific workaround for REDHAT-BUG-1626193; upgrading to a secure version is recommended.