CVE-2018-16585

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2018-16585
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-16585.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-16585
Related
Withdrawn
2019-10-09T20:59:43Z
Published
2018-09-06T14:29:00Z
Modified
2024-09-18T01:00:21Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. Note: A reputable source believes that the CVE is potentially a duplicate of CVE-2018-15910 as explained in Red Hat bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1626193)

References

Affected packages

Debian:11 / ghostscript

Package

Name
ghostscript
Purl
pkg:deb/debian/ghostscript?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.25~dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / ghostscript

Package

Name
ghostscript
Purl
pkg:deb/debian/ghostscript?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.25~dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / ghostscript

Package

Name
ghostscript
Purl
pkg:deb/debian/ghostscript?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.25~dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}