CVE-2018-16863

It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat Enterprise Linux 7.
Configurations

Configuration 1 (hide)

cpe:2.3:a:artifex:ghostscript:9.07:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-12-03 17:29

Updated : 2024-02-04 20:03


NVD link : CVE-2018-16863

Mitre link : CVE-2018-16863

CVE.ORG link : CVE-2018-16863


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_server_eus
  • enterprise_linux_server_tus
  • enterprise_linux_workstation
  • enterprise_linux_desktop
  • enterprise_linux_server_aus

artifex

  • ghostscript
CWE
CWE-184

Incomplete List of Disallowed Inputs

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')