CVE-2018-19475

Scores

EPSS

0.653medium65.3%
0%20%40%60%80%100%

Percentile: 65.3%

CVSS

7.3high3.x
0246810

CVSS Score: 7.3/10

All CVSS Scores

CVSS 3.x
7.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CVSS 2.0
6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

psi/zdevice2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because available stack space is not checked when the device remains the same.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

astradebiannvdredhatubuntu

CWEs

CWE-119

Related Vulnerabilities

Recommendations

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2019:0229

Source: nvd

Before applying this update, ensure all previously released errata relevant to your system have been applied.
See the following documentation, which will be updated shortly for release 3.11.82, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258.

URL: https://access.redhat.com/errata/RHBA-2019:0327

Vulnerable Software (17)

Type: Configuration

Product: ghostscript

Operating System: ubuntu bionic 18.04

Trait:
{  "fixed": "9.26~dfsg+0-0ubuntu0.18.04.1"}

Source: ubuntu

Type: Configuration

Product: ghostscript

Operating System: ubuntu cosmic 18.10

Trait:
{  "fixed": "9.26~dfsg+0-0ubuntu0.18.10.1"}

Source: ubuntu

Type: Configuration

Product: ghostscript

Operating System: ubuntu trusty 14.04

Trait:
{  "fixed": "9.26~dfsg+0-0ubuntu0.14.04.1"}

Source: ubuntu

Type: Configuration

Product: ghostscript

Operating System: ubuntu xenial 16.04

Trait:
{  "fixed": "9.26~dfsg+0-0ubuntu0.16.04.1"}

Source: ubuntu

Type: Configuration

Product: ghostscript

Operating System: astra 1.6.3

Trait:
{  "unaffected": true}

Source: astra

Type: Configuration

Product: ghostscript

Operating System: debian

Trait:
{  "fixed": "9.26~dfsg-1"}

Source: debian

Type: Configuration

Product: ghostscript

Operating System: rhel 7

Trait:
{  "fixed": "9.07-31.el7_6.9"}

Source: redhat

Type: Configuration

Vendor: *

Product: debian_linux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",...

Source: nvd

Type: Configuration

Vendor: *

Product: enterprise_linux_desktop

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linu...

Source: nvd

Type: Configuration

Vendor: *

Product: enterprise_linux_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linu...

Source: nvd

Type: Configuration

Vendor: *

Product: enterprise_linux_server_aus

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linu...

Source: nvd

Type: Configuration

Vendor: *

Product: enterprise_linux_server_eus

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linu...

Source: nvd

Type: Configuration

Vendor: *

Product: enterprise_linux_server_tus

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linu...

Source: nvd

Type: Configuration

Vendor: *

Product: enterprise_linux_workstation

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linu...

Source: nvd

Type: Configuration

Vendor: *

Product: ghostscript

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",      "versionEndExcluding": "9.26",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

Type: Configuration

Vendor: *

Product: openshift_container_platform

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linu...

Source: nvd

Type: Configuration

Vendor: *

Product: ubuntu_linux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*...

Source: nvd

End of list