CVE-2018-16542Out-of-bounds Write in Ghostscript

Severity
5.5MEDIUMNVD
EPSS
0.4%
top 37.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 5
Latest updateMay 24

Description

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

Also affects: Debian Linux 8.0, 9.0, Ubuntu Linux 14.04, 16.04, 18.04, Enterprise Linux 7.0, 7.5

🔴Vulnerability Details

4
GHSA
Jenkins Anchore Container Scanner Plugin vulnerable to Insufficiently Protected Credentials2022-05-24
GHSA
GHSA-rpj7-rf55-hgch: In Artifex Ghostscript before 92022-05-13
OSV
CVE-2018-16542: In Artifex Ghostscript before 92018-09-05
CVEList
CVE-2018-16542: In Artifex Ghostscript before 92018-09-05

📋Vendor Advisories

3
Ubuntu
Ghostscript vulnerabilities2018-09-19
Red Hat
ghostscript: .definemodifiedfont memory corruption if /typecheck is handled (699668)2018-09-06
Debian
CVE-2018-16542: ghostscript - In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript ...2018

💬Community

2
Bugzilla
CVE-2018-16542 ghostscript: .definemodifiedfont memory corruption if /typecheck is handled (699668) [fedora-all]2018-09-06
Bugzilla
CVE-2018-16542 ghostscript: .definemodifiedfont memory corruption if /typecheck is handled (699668)2018-08-23
CVE-2018-16542 — Out-of-bounds Write in Ghostscript | cvebase