CVE-2018-19134
7.8HIGH
Summary
In Artifex Ghostscript through 9.25, the setpattern operator did not properly validate certain types. A specially crafted PostScript document could exploit this to crash Ghostscript or, possibly, execute arbitrary code in the context of the Ghostscript process. This is a type confusion issue because of failure to check whether the Implementation of a pattern dictionary was a structure type.
Refferences
https://access.redhat.com/errata/RHSA-2018:3834
vendor-advisoryx_refsource_REDHAT
https://bugs.ghostscript.com/show_bug.cgi?id=700141
x_refsource_CONFIRM
http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff...
x_refsource_CONFIRM
https://semmle.com/news/semmle-discovers-severe-vulnerabi...
x_refsource_MISC
http://www.securityfocus.com/bid/106278
vdb-entryx_refsource_BID
https://lists.debian.org/debian-lts-announce/2018/12/msg0...
mailing-listx_refsource_MLIST
https://www.ghostscript.com/doc/9.26/News.htm
x_refsource_CONFIRM
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database