Rapid7 Vulnerability & Exploit Database

Oracle Linux: CVE-2018-15910: ELSA-2018-2918: ghostscript security update (IMPORTANT) (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Oracle Linux: CVE-2018-15910: ELSA-2018-2918: ghostscript security update (IMPORTANT) (Multiple Advisories)

Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
08/21/2018
Created
07/23/2020
Added
07/21/2020
Modified
07/22/2024

Description

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code. It was discovered that the type of the LockDistillerParams parameter is not properly verified. An attacker could possibly exploit this to bypass the -dSAFER protection and crash ghostscript or, possibly, execute arbitrary code in the ghostscript context via a specially crafted PostScript document.

Solution(s)

  • oracle-linux-upgrade-ghostscript
  • oracle-linux-upgrade-ghostscript-cups
  • oracle-linux-upgrade-ghostscript-devel
  • oracle-linux-upgrade-ghostscript-doc
  • oracle-linux-upgrade-ghostscript-gtk

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;