[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2018-1088 --- ghostscript

ID: oval:org.secpod.oval:def:1700083Date: (C)2018-10-16   (M)2024-04-17
Class: PATCHFamily: unix




It was discovered that the ghostscript .shfill operator did not properly validate certain types. An attacker could possibly exploit this to bypass the -dSAFER protection and crash ghostscript or, possibly, execute arbitrary code in the ghostscript context via a specially crafted PostScript document.An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in quot;ztypequot; could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing . This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.It was discovered that the ghostscript PDF14 compositor did not properly handle the copying of a device. An attacker could possibly exploit this to bypass the -dSAFER protection and crash ghostscript or, possibly, execute arbitrary code in the ghostscript context via a specially crafted PostScript document.It was discovered that the ghostscript device cleanup did not properly handle devices replaced with a null device. An attacker could possibly exploit this to bypass the -dSAFER protection and crash ghostscript or, possibly, execute arbitrary code in the ghostscript context via a specially crafted PostScript document.It was discovered that the ghostscript did not properly restrict access to files open prior to enabling the -dSAFER mode. An attacker could possibly exploit this to bypass the -dSAFER protection and disclose the content of affected files via a specially crafted PostScript document.An issue was discovered in Artifex Ghostscript before 9.25. Incorrect quot;restoration of privilegequot; checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the quot;pipequot; instruction. This is due to an incomplete fix for CVE-2018-16509 .It was discovered that ghostscript did not properly handle certain stack overflow error conditions. An attacker could possibly exploit this to bypass the -dSAFER protection and crash ghostscript or, possibly, execute arbitrary code in the ghostscript context via a specially crafted PostScript document.Ghostscript did not honor the -dSAFER option when executing the quot;statusquot; instruction, which can be used to retrieve information such as a file#039;s existence and size. A specially crafted postscript document could use this flow to gain information on the targeted system#039;s filesystem content.It was discovered that the ghostscript did not properly validate the operands passed to the setcolor function. An attacker could possibly exploit this to bypass the -dSAFER protection and crash ghostscript or, possibly, execute arbitrary code in the ghostscript context via a specially crafted PostScript document.It was discovered that the type of the LockDistillerParams parameter is not properly verified. An attacker could possibly exploit this to bypass the -dSAFER protection and crash ghostscript or, possibly, execute arbitrary code in the ghostscript context via a specially crafted PostScript document.It was discovered that the ghostscript /invalidaccess checks fail under certain conditions. An attacker could possibly exploit this to bypass the -dSAFER protection and, for example, execute arbitrary shell commands via a specially crafted PostScript document.It was discovered that ghostscript did not properly verify the key used in aesdecode. An attacker could possibly exploit this to bypass the -dSAFER protection and crash ghostscript or, possibly, execute arbitrary code in the ghostscript context via a specially crafted PostScript document.It was discovered that the ghostscript .tempfile function did not properly handle file permissions. An attacker could possibly exploit this to exploit this to bypass the -dSAFER protection and delete files or disclose their content via a specially crafted PostScript document.

Platform:
Amazon Linux 2
Product:
ghostscript
Reference:
ALAS2-2018-1088
CVE-2018-16539
CVE-2018-16802
CVE-2018-16511
CVE-2018-15908
CVE-2018-15909
CVE-2018-16509
CVE-2018-16513
CVE-2018-15911
CVE-2018-15910
CVE-2018-16541
CVE-2018-16540
CVE-2018-16542
CVE-2018-11645
CVE-2018-16585
CVE    14
CVE-2018-11645
CVE-2018-16540
CVE-2018-15909
CVE-2018-15908
...
CPE    2
cpe:/a:ghostscript:ghostscript
cpe:/o:amazon:linux:2

© SecPod Technologies