CVE-2020-16303
Severity
7.8HIGH
EPSS
2.9%
top 13.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 13
Latest updateMay 24
Description
A use-after-free vulnerability in xps_finish_image_path() in devices/vector/gdevxps.c of Artifex Software GhostScript v9.50 allows a remote attacker to escalate privileges via a crafted PDF file. This is fixed in v9.51.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages2 packages
Also affects: Debian Linux 10.0, 9.0, Ubuntu Linux 16.04, 18.04, 20.04
🔴Vulnerability Details
3GHSA▶
GHSA-3jwg-r279-2xj2: A use-after-free vulnerability in xps_finish_image_path() in devices/vector/gdevxps↗2022-05-24
CVEList▶
CVE-2020-16303: A use-after-free vulnerability in xps_finish_image_path() in devices/vector/gdevxps↗2020-08-13
OSV▶
CVE-2020-16303: A use-after-free vulnerability in xps_finish_image_path() in devices/vector/gdevxps↗2020-08-13
📋Vendor Advisories
3💬Community
2Bugzilla▶
CVE-2020-16303 ghostscript: use-after-free in xps_finish_image_path() in devices/vector/gdevxps.c could result in a privilege escalation↗2020-08-19
Bugzilla▶
CVE-2020-16303 ghostscript: use-after-free vulnerability in xps_finish_image_path() in devices/vector/gdevxps.c could result in a privilege escalation via a crafted PDF file [fedora-all]↗2020-08-19