6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.3 High
AI Score
Confidence
High
0.973 High
EPSS
Percentile
99.9%
An issue was discovered in Artifex Ghostscript before 9.25. Incorrect “restoration of privilege” checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the “pipe” instruction. This is due to an incomplete fix for CVE-2018-16509.
CPE | Name | Operator | Version |
---|---|---|---|
artifex:ghostscript | artifex ghostscript | lt | 9.25 |
git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=3e5d316b72e3965b7968bb1d96baa137cd063ac6
git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=643b24dbd002fb9c131313253c307cf3951b3d47
access.redhat.com/errata/RHSA-2018:3834
git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=5812b1b78fc4d36fdc293b7859de69241140d590
lists.debian.org/debian-lts-announce/2018/09/msg00015.html
seclists.org/oss-sec/2018/q3/228
seclists.org/oss-sec/2018/q3/229
security.gentoo.org/glsa/201811-12
usn.ubuntu.com/3768-1/
www.debian.org/security/2018/dsa-4294
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.3 High
AI Score
Confidence
High
0.973 High
EPSS
Percentile
99.9%