Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-17183

Опубликовано: 19 сент. 2018
Источник: ubuntu
Приоритет: medium
CVSS2: 6.8
CVSS3: 7.8

Описание

Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.

РелизСтатусПримечание
bionic

released

9.25~dfsg+1-0ubuntu0.18.04.1
devel

not-affected

9.25~dfsg+1-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [9.25~dfsg+1-0ubuntu0.14.04.1]]
esm-infra/bionic

released

9.25~dfsg+1-0ubuntu0.18.04.1
esm-infra/xenial

released

9.25~dfsg+1-0ubuntu0.16.04.1
precise/esm

DNE

trusty

released

9.25~dfsg+1-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [9.25~dfsg+1-0ubuntu0.14.04.1]
upstream

released

9.25~dfsg-1
xenial

released

9.25~dfsg+1-0ubuntu0.16.04.1

Показывать по

6.8 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
около 7 лет назад

Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.

CVSS3: 7.8
nvd
около 7 лет назад

Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.

CVSS3: 7.8
debian
около 7 лет назад

Artifex Ghostscript before 9.25 allowed a user-writable error exceptio ...

CVSS3: 7.8
github
больше 3 лет назад

Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.

CVSS3: 7.8
fstec
около 7 лет назад

Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код

6.8 Medium

CVSS2

7.8 High

CVSS3