cpe:/a:artifex:ghostscript:8_64 cpe:/a:artifex:ghostscript:9.00 cpe:/a:artifex:ghostscript:9.01 cpe:/a:artifex:ghostscript:9.02 cpe:/a:artifex:ghostscript:9.04 cpe:/a:artifex:ghostscript:9.05 cpe:/a:artifex:ghostscript:9.06 cpe:/a:artifex:ghostscript:9.07 cpe:/a:artifex:ghostscript:9.09 cpe:/a:artifex:ghostscript:9.10 cpe:/a:artifex:ghostscript:9.14 cpe:/a:artifex:ghostscript:9.15 cpe:/a:artifex:ghostscript:9.16 cpe:/a:artifex:ghostscript:9.18 cpe:/a:artifex:ghostscript:9.19 cpe:/a:artifex:ghostscript:9.20 cpe:/a:artifex:ghostscript:9.21 cpe:/a:artifex:ghostscript:9.22 cpe:/a:artifex:ghostscript:9.23 cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~ cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~ cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~ cpe:/o:debian:debian_linux:8.0 cpe:/o:debian:debian_linux:9.0 cpe:/o:redhat:enterprise_linux_desktop:7.0 cpe:/o:redhat:enterprise_linux_server:7.0 cpe:/o:redhat:enterprise_linux_server_aus:7.6 cpe:/o:redhat:enterprise_linux_server_eus:7.6 cpe:/o:redhat:enterprise_linux_server_tus:7.6 cpe:/o:redhat:enterprise_linux_workstation:7.0 CVE-2018-16541 2018-09-05T14:29:00.777-04:00 2019-03-07T11:06:48.613-05:00 4.3 NETWORK MEDIUM NONE NONE NONE PARTIAL http://nvd.nist.gov 2019-03-07T10:43:48.797-05:00 DEBIAN DSA-4288 GENTOO GLSA-201811-12 REDHAT RHSA-2018:3834 UBUNTU USN-3768-1 MLIST [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update MISC http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d MISC https://bugs.ghostscript.com/show_bug.cgi?id=699664 MISC https://www.artifex.com/news/ghostscript-security-resolved/ In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.