CVE-2018-18073
Summary
| CVE | CVE-2018-18073 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-10-15 16:29:00 UTC |
| Updated | 2023-11-07 02:54:00 UTC |
| Description | Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| git.ghostscript.com Git - ghostpdl.git/commit |
CONFIRM |
git.ghostscript.com |
Patch, Vendor Advisory |
| USN-3803-1: Ghostscript vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| 699927 – .setglobal exposes dangerous operators in saved estack |
CONFIRM |
bugs.ghostscript.com |
Issue Tracking, Patch, Vendor Advisory |
| git.ghostscript.com Git - ghostpdl.git/commit |
|
git.ghostscript.com |
|
| Debian -- Security Information -- DSA-4336-1 ghostscript |
DEBIAN |
www.debian.org |
Third Party Advisory |
| Ghostscript Exposed System Operators ≈ Packet Storm |
MISC |
packetstormsecurity.com |
Third Party Advisory, VDB Entry |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| 1690 -
ghostscript: $error object can expose system operators in saved execution stack. -
project-zero -
Monorail |
MISC |
bugs.chromium.org |
Issue Tracking, Patch, Third Party Advisory |
| oss-security - ghostscript: saved execution stacks can leak operator arrays (CVE-2018-18073) |
MLIST |
www.openwall.com |
Mailing List, Patch, Third Party Advisory |
| [SECURITY] [DLA 1552-1] ghostscript security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 500208 Alpine Linux Security Update for ghostscript
- 503950 Alpine Linux Security Update for ghostscript