CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.9%
The remote host is missing an update for the
# SPDX-FileCopyrightText: 2022 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.10.2018.0378");
script_cve_id("CVE-2018-15908", "CVE-2018-15909", "CVE-2018-15910", "CVE-2018-15911", "CVE-2018-16509", "CVE-2018-16510", "CVE-2018-16511", "CVE-2018-16513", "CVE-2018-16539", "CVE-2018-16540", "CVE-2018-16541", "CVE-2018-16542", "CVE-2018-16543", "CVE-2018-16802");
script_tag(name:"creation_date", value:"2022-01-28 10:58:44 +0000 (Fri, 28 Jan 2022)");
script_version("2024-02-02T05:06:09+0000");
script_tag(name:"last_modification", value:"2024-02-02 05:06:09 +0000 (Fri, 02 Feb 2024)");
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2018-10-30 18:31:39 +0000 (Tue, 30 Oct 2018)");
script_name("Mageia: Security Advisory (MGASA-2018-0378)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2022 Greenbone AG");
script_family("Mageia Linux Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/mageia_linux", "ssh/login/release", re:"ssh/login/release=MAGEIA6");
script_xref(name:"Advisory-ID", value:"MGASA-2018-0378");
script_xref(name:"URL", value:"https://advisories.mageia.org/MGASA-2018-0378.html");
script_xref(name:"URL", value:"https://bugs.mageia.org/show_bug.cgi?id=23526");
script_xref(name:"URL", value:"https://www.ghostscript.com/doc/9.24/History9.htm#Version9.24");
script_xref(name:"URL", value:"http://openwall.com/lists/oss-security/2018/09/05/3");
script_xref(name:"URL", value:"http://openwall.com/lists/oss-security/2018/09/06/3");
script_xref(name:"URL", value:"http://openwall.com/lists/oss-security/2018/09/09/1");
script_xref(name:"URL", value:"http://openwall.com/lists/oss-security/2018/09/09/2");
script_xref(name:"URL", value:"http://openwall.com/lists/oss-security/2018/09/11/1");
script_tag(name:"summary", value:"The remote host is missing an update for the 'ghostscript' package(s) announced via the MGASA-2018-0378 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"Updated ghostscript packages fix several security vulnerabilities
including:
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply
malicious PostScript files to bypass .tempfile restrictions and write files
(CVE-2018-15908).
In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the
.shfill operator could be used by attackers able to supply crafted PostScript
files to crash the interpreter or potentially execute code (CVE-2018-15909).
In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use a type confusion in the LockDistillerParams
parameter to crash the interpreter or execute code (CVE-2018-15910).
In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply
crafted PostScript could use uninitialized memory access in the aesdecode
operator to crash the interpreter or potentially execute code
(CVE-2018-15911).
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect
'restoration of privilege' checking during handling of /invalidaccess
exceptions could be used by attackers able to supply crafted PostScript
to execute code using the 'pipe' instruction (CVE-2018-16509).
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec
stack handling in the 'CS' and 'SC' PDF primitives could be used by remote
attackers able to supply crafted PDFs to crash the interpreter or possibly
have unspecified other impact (CVE-2018-16510).
An issue was discovered in Artifex Ghostscript before 9.24. A type
confusion in 'ztype' could be used by remote attackers able to supply
crafted PostScript to crash the interpreter or possibly have unspecified
other impact (CVE-2018-16511).
In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use a type confusion in the setcolor function to
crash the interpreter or possibly have unspecified other impact
(CVE-2018-16513).
In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use incorrect access checking in temp file handling
to disclose contents of files on the system otherwise not readable
(CVE-2018-16539).
In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files to the builtin PDF14 converter could use a use-after-free
in copydevice handling to crash the interpreter or possibly have unspecified
other impact (CVE-2018-16540).
In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use incorrect free logic in pagedevice replacement
to crash the interpreter (CVE-2018-16541).
In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use insufficient interpreter stack-size checking
during error handling to crash the interpreter (CVE-2018-16542).
In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution
allow attackers to have an unspecified ... [Please see the references for more information on the vulnerabilities]");
script_tag(name:"affected", value:"'ghostscript' package(s) on Mageia 6.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "MAGEIA6") {
if(!isnull(res = isrpmvuln(pkg:"ghostscript", rpm:"ghostscript~9.24~1.5.mga6", rls:"MAGEIA6"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"ghostscript-X", rpm:"ghostscript-X~9.24~1.5.mga6", rls:"MAGEIA6"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"ghostscript-common", rpm:"ghostscript-common~9.24~1.5.mga6", rls:"MAGEIA6"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"ghostscript-doc", rpm:"ghostscript-doc~9.24~1.5.mga6", rls:"MAGEIA6"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"ghostscript-dvipdf", rpm:"ghostscript-dvipdf~9.24~1.5.mga6", rls:"MAGEIA6"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"ghostscript-module-X", rpm:"ghostscript-module-X~9.24~1.5.mga6", rls:"MAGEIA6"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"lib64gs-devel", rpm:"lib64gs-devel~9.24~1.5.mga6", rls:"MAGEIA6"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"lib64gs9", rpm:"lib64gs9~9.24~1.5.mga6", rls:"MAGEIA6"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"lib64ijs-devel", rpm:"lib64ijs-devel~0.35~132.5.mga6", rls:"MAGEIA6"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"lib64ijs1", rpm:"lib64ijs1~0.35~132.5.mga6", rls:"MAGEIA6"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libgs-devel", rpm:"libgs-devel~9.24~1.5.mga6", rls:"MAGEIA6"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libgs9", rpm:"libgs9~9.24~1.5.mga6", rls:"MAGEIA6"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libijs-devel", rpm:"libijs-devel~0.35~132.5.mga6", rls:"MAGEIA6"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libijs1", rpm:"libijs1~0.35~132.5.mga6", rls:"MAGEIA6"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
openwall.com/lists/oss-security/2018/09/05/3
openwall.com/lists/oss-security/2018/09/06/3
openwall.com/lists/oss-security/2018/09/09/1
openwall.com/lists/oss-security/2018/09/09/2
openwall.com/lists/oss-security/2018/09/11/1
advisories.mageia.org/MGASA-2018-0378.html
bugs.mageia.org/show_bug.cgi?id=23526
www.ghostscript.com/doc/9.24/History9.htm#Version9.24
MGASA-2018-0378
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.9%