CVE-2018-16863
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/12/2018
Last modified:
12/02/2023
Description
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat Enterprise Linux 7.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:artifex:ghostscript:9.07:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba%3Dcommit%3Bh%3D520bb0ea7519
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba%3Dcommit%3Bh%3D5516c614dc33
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba%3Dcommit%3Bh%3D78911a01b67d
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba%3Dcommit%3Bh%3D79cccf641486
- https://access.redhat.com/errata/RHSA-2018:3761
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16863