CVE-2018-15910

Impact:
Important
Public Date:
2018-08-21
CWE:
CWE-704
Bugzilla:
1619751: CVE-2018-15910 ghostscript: LockDistillerParams type confusion (699656)
It was discovered that the type of the LockDistillerParams parameter is not properly verified. An attacker could possibly exploit this to bypass the -dSAFER protection and crash ghostscript or, possibly, execute arbitrary code in the ghostscript context via a specially crafted PostScript document.

Find out more about CVE-2018-15910 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue affects the versions of ghostscript as shipped with Red Hat Enterprise Linux 6 and 7.

Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

CVSS v3 metrics

CVSS3 Base Score 7.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Low
Integrity Impact Low
Availability Impact Low

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (ghostscript) RHSA-2018:2918 2018-10-16

Affected Packages State

Platform Package State
Red Hat OpenShift Enterprise 3.2 mediawiki Not affected
Red Hat OpenShift Enterprise 3.11 mediawiki Not affected
Red Hat OpenShift Enterprise 3.1 mediawiki Not affected
Red Hat OpenShift Enterprise 3.0 mediawiki Not affected
Red Hat OpenShift Container Platform 3.9 mediawiki Not affected
Red Hat OpenShift Container Platform 3.7 mediawiki Not affected
Red Hat OpenShift Container Platform 3.6 mediawiki Not affected
Red Hat OpenShift Container Platform 3.5 mediawiki Not affected
Red Hat OpenShift Container Platform 3.4 mediawiki Not affected
Red Hat OpenShift Container Platform 3.3 mediawiki Not affected
Red Hat Enterprise Linux 6 ghostscript Will not fix
Red Hat Enterprise Linux 5 ghostscript Will not fix

Acknowledgements

Red Hat would like to thank Tavis Ormandy (Google Project Zero) for reporting this issue.

Mitigation

Please see https://bugzilla.redhat.com/show_bug.cgi?id=1619748#c3

External References

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.