Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2018.0378
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2018-0378)
Zusammenfassung:The remote host is missing an update for the 'ghostscript' package(s) announced via the MGASA-2018-0378 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'ghostscript' package(s) announced via the MGASA-2018-0378 advisory.

Vulnerability Insight:
Updated ghostscript packages fix several security vulnerabilities
including:

In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply
malicious PostScript files to bypass .tempfile restrictions and write files
(CVE-2018-15908).

In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the
.shfill operator could be used by attackers able to supply crafted PostScript
files to crash the interpreter or potentially execute code (CVE-2018-15909).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use a type confusion in the LockDistillerParams
parameter to crash the interpreter or execute code (CVE-2018-15910).

In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply
crafted PostScript could use uninitialized memory access in the aesdecode
operator to crash the interpreter or potentially execute code
(CVE-2018-15911).

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect
'restoration of privilege' checking during handling of /invalidaccess
exceptions could be used by attackers able to supply crafted PostScript
to execute code using the 'pipe' instruction (CVE-2018-16509).

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec
stack handling in the 'CS' and 'SC' PDF primitives could be used by remote
attackers able to supply crafted PDFs to crash the interpreter or possibly
have unspecified other impact (CVE-2018-16510).

An issue was discovered in Artifex Ghostscript before 9.24. A type
confusion in 'ztype' could be used by remote attackers able to supply
crafted PostScript to crash the interpreter or possibly have unspecified
other impact (CVE-2018-16511).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use a type confusion in the setcolor function to
crash the interpreter or possibly have unspecified other impact
(CVE-2018-16513).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use incorrect access checking in temp file handling
to disclose contents of files on the system otherwise not readable
(CVE-2018-16539).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files to the builtin PDF14 converter could use a use-after-free
in copydevice handling to crash the interpreter or possibly have unspecified
other impact (CVE-2018-16540).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use incorrect free logic in pagedevice replacement
to crash the interpreter (CVE-2018-16541).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use insufficient interpreter stack-size checking
during error handling to crash the interpreter (CVE-2018-16542).

In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution
allow attackers to have an unspecified ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'ghostscript' package(s) on Mageia 6.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2018-15908
Debian Security Information: DSA-4288 (Google Search)
https://www.debian.org/security/2018/dsa-4288
https://security.gentoo.org/glsa/201811-12
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
https://www.kb.cert.org/vuls/id/332928
https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html
RedHat Security Advisories: RHSA-2018:3650
https://access.redhat.com/errata/RHSA-2018:3650
https://usn.ubuntu.com/3768-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-15909
BugTraq ID: 105178
http://www.securityfocus.com/bid/105178
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0b6cd1918e1ec4ffd087400a754a845180a4522b
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=e01e77a36cbb2e0277bc3a63852244bec41be0f6
Common Vulnerability Exposure (CVE) ID: CVE-2018-15910
BugTraq ID: 105122
http://www.securityfocus.com/bid/105122
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c3476dde7743761a4e1d39a631716199b696b880
https://bugs.ghostscript.com/show_bug.cgi?id=699656
RedHat Security Advisories: RHSA-2018:2918
https://access.redhat.com/errata/RHSA-2018:2918
Common Vulnerability Exposure (CVE) ID: CVE-2018-15911
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=8e9ce5016db968b40e4ec255a3005f2786cce45f
https://bugs.ghostscript.com/show_bug.cgi?id=699665
RedHat Security Advisories: RHSA-2018:3834
https://access.redhat.com/errata/RHSA-2018:3834
Common Vulnerability Exposure (CVE) ID: CVE-2018-16509
Debian Security Information: DSA-4294 (Google Search)
https://www.debian.org/security/2018/dsa-4294
https://www.exploit-db.com/exploits/45369/
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5516c614dc33662a2afdc377159f70218e67bde5
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=78911a01b67d590b4a91afac2e8417360b934156
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486a6595c43f1de1cd7ade696020a31
http://seclists.org/oss-sec/2018/q3/142
https://bugs.ghostscript.com/show_bug.cgi?id=699654
https://www.artifex.com/news/ghostscript-security-resolved/
RedHat Security Advisories: RHSA-2018:3760
https://access.redhat.com/errata/RHSA-2018:3760
Common Vulnerability Exposure (CVE) ID: CVE-2018-16510
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ea735ba37dc0fd5f5622d031830b9a559dec1cc9
http://openwall.com/lists/oss-security/2018/08/27/4
https://bugs.ghostscript.com/show_bug.cgi?id=699671
https://usn.ubuntu.com/3773-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-16511
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0edd3d6c634a577db261615a9dc2719bca7f6e01
http://seclists.org/oss-sec/2018/q3/182
https://bugs.ghostscript.com/show_bug.cgi?id=699659
Common Vulnerability Exposure (CVE) ID: CVE-2018-16513
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
https://bugs.ghostscript.com/show_bug.cgi?id=699655
Common Vulnerability Exposure (CVE) ID: CVE-2018-16539
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=a054156d425b4dbdaaa9fda4b5f1182b27598c2b
https://bugs.ghostscript.com/show_bug.cgi?id=699658
Common Vulnerability Exposure (CVE) ID: CVE-2018-16540
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c432131c3fdb2143e148e8ba88555f7f7a63b25e
https://bugs.ghostscript.com/show_bug.cgi?id=699661
RedHat Security Advisories: RHBA-2019:0327
https://access.redhat.com/errata/RHBA-2019:0327
RedHat Security Advisories: RHSA-2019:0229
https://access.redhat.com/errata/RHSA-2019:0229
Common Vulnerability Exposure (CVE) ID: CVE-2018-16541
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
https://bugs.ghostscript.com/show_bug.cgi?id=699664
Common Vulnerability Exposure (CVE) ID: CVE-2018-16542
BugTraq ID: 105337
http://www.securityfocus.com/bid/105337
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b575e1ec42cc86f6a58c603f2a88fcc2af699cc8
https://bugs.ghostscript.com/show_bug.cgi?id=699668
Common Vulnerability Exposure (CVE) ID: CVE-2018-16543
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5b5536fa88a9e885032bc0df3852c3439399a5c0
https://bugs.ghostscript.com/show_bug.cgi?id=699670
https://lists.debian.org/debian-lts-announce/2018/09/msg00038.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-16802
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3e5d316b72e3965b7968bb1d96baa137cd063ac6
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=643b24dbd002fb9c131313253c307cf3951b3d47
https://seclists.org/oss-sec/2018/q3/229
https://seclists.org/oss-sec/2018/q3/228
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.