CVE-2020-16303

CWE-416Use After Free9 documents8 sources
Severity
7.8HIGH
EPSS
2.9%
top 13.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 13
Latest updateMay 24

Description

A use-after-free vulnerability in xps_finish_image_path() in devices/vector/gdevxps.c of Artifex Software GhostScript v9.50 allows a remote attacker to escalate privileges via a crafted PDF file. This is fixed in v9.51.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debianghostscript< 9.51~dfsg-1+3

Also affects: Debian Linux 10.0, 9.0, Ubuntu Linux 16.04, 18.04, 20.04

🔴Vulnerability Details

3
GHSA
GHSA-3jwg-r279-2xj2: A use-after-free vulnerability in xps_finish_image_path() in devices/vector/gdevxps2022-05-24
CVEList
CVE-2020-16303: A use-after-free vulnerability in xps_finish_image_path() in devices/vector/gdevxps2020-08-13
OSV
CVE-2020-16303: A use-after-free vulnerability in xps_finish_image_path() in devices/vector/gdevxps2020-08-13

📋Vendor Advisories

3
Ubuntu
Ghostscript vulnerabilities2020-08-24
Red Hat
ghostscript: use-after-free in xps_finish_image_path() in devices/vector/gdevxps.c could result in a privilege escalation2020-08-13
Debian
CVE-2020-16303: ghostscript - A use-after-free vulnerability in xps_finish_image_path() in devices/vector/gdev...2020

💬Community

2
Bugzilla
CVE-2020-16303 ghostscript: use-after-free in xps_finish_image_path() in devices/vector/gdevxps.c could result in a privilege escalation2020-08-19
Bugzilla
CVE-2020-16303 ghostscript: use-after-free vulnerability in xps_finish_image_path() in devices/vector/gdevxps.c could result in a privilege escalation via a crafted PDF file [fedora-all]2020-08-19
CVE-2020-16303 (HIGH CVSS 7.8) | A use-after-free vulnerability in x | cvebase.io