CVE-2018-16863

It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat Enterprise Linux 7.
Configurations

Configuration 1 (hide)

cpe:2.3:a:artifex:ghostscript:9.07:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:53

Type Values Removed Values Added
CVSS v2 : 9.3
v3 : 7.8
v2 : 9.3
v3 : 7.3
References () http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=520bb0ea7519 - () http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=520bb0ea7519 -
References () http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=5516c614dc33 - () http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=5516c614dc33 -
References () http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=78911a01b67d - () http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=78911a01b67d -
References () http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=79cccf641486 - () http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=79cccf641486 -
References () https://access.redhat.com/errata/RHSA-2018:3761 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3761 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16863 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16863 - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2018-12-03 17:29

Updated : 2024-11-21 03:53


NVD link : CVE-2018-16863

Mitre link : CVE-2018-16863

CVE.ORG link : CVE-2018-16863


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_server_eus
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_server_tus
  • enterprise_linux_workstation

artifex

  • ghostscript
CWE
CWE-184

Incomplete List of Disallowed Inputs

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')