In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.
References
Link | Resource |
---|---|
http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=a054156d425b4dbdaaa9fda4b5f1182b27598c2b | |
https://access.redhat.com/errata/RHSA-2018:3650 | Third Party Advisory |
https://bugs.ghostscript.com/show_bug.cgi?id=699658 | Issue Tracking Permissions Required Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201811-12 | Third Party Advisory |
https://usn.ubuntu.com/3768-1/ | Third Party Advisory |
https://www.artifex.com/news/ghostscript-security-resolved/ | Patch Vendor Advisory |
https://www.debian.org/security/2018/dsa-4288 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-09-05T18:00:00
Updated: 2018-11-27T10:57:01
Reserved: 2018-09-05T00:00:00
Link: CVE-2018-16539
JSON object: View
NVD Information
Status : Modified
Published: 2018-09-05T18:29:00.497
Modified: 2023-11-07T02:53:48.850
Link: CVE-2018-16539
JSON object: View
Redhat Information
No data.
CWE