Show filters
148 Total Results
Displaying 61-70 of 148
Sort by:
Attacker Value
Unknown

CVE-2017-15652

Disclosure Date: May 23, 2019 (last updated November 08, 2023)
Artifex Ghostscript 9.22 is affected by: Obtain Information. The impact is: obtain sensitive information. The component is: affected source code file, affected function, affected executable, affected libga (imagemagick used that). The attack vector is: Someone must open a postscript file though ghostscript. Because of imagemagick also use libga, so it was affected as well.
0
Attacker Value
Unknown

CVE-2019-3839

Disclosure Date: May 16, 2019 (last updated November 08, 2023)
It was found that in ghostscript some privileged operators remained accessible from various places after the CVE-2019-6116 fix. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER. Ghostscript versions before 9.27 are vulnerable.
Attacker Value
Unknown

CVE-2018-20817

Disclosure Date: April 19, 2019 (last updated November 27, 2024)
SV_SteamAuthClient in various Activision Infinity Ward Call of Duty games before 2015-08-11 is missing a size check when reading authBlob data into a buffer, which allows one to execute code on the remote target machine when sending a steam authentication request. This affects Call of Duty: Modern Warfare 2, Call of Duty: Modern Warfare 3, Call of Duty: Ghosts, Call of Duty: Advanced Warfare, Call of Duty: Black Ops 1, and Call of Duty: Black Ops 2.
0
Attacker Value
Unknown

CVE-2019-3838

Disclosure Date: March 25, 2019 (last updated November 08, 2023)
It was found that the forceput operator could be extracted from the DefineResource method in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
Attacker Value
Unknown

CVE-2019-3835

Disclosure Date: March 25, 2019 (last updated November 08, 2023)
It was found that the superexec operator was available in the internal dictionary in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
Attacker Value
Unknown

CVE-2019-6116

Disclosure Date: March 21, 2019 (last updated November 08, 2023)
In Artifex Ghostscript through 9.26, ephemeral or transient procedures can allow access to system operators, leading to remote code execution.
Attacker Value
Unknown

CVE-2018-19478

Disclosure Date: January 02, 2019 (last updated November 08, 2023)
In Artifex Ghostscript before 9.26, a carefully crafted PDF file can trigger an extremely long running computation when parsing the file.
0
Attacker Value
Unknown

CVE-2018-19134

Disclosure Date: December 20, 2018 (last updated November 08, 2023)
In Artifex Ghostscript through 9.25, the setpattern operator did not properly validate certain types. A specially crafted PostScript document could exploit this to crash Ghostscript or, possibly, execute arbitrary code in the context of the Ghostscript process. This is a type confusion issue because of failure to check whether the Implementation of a pattern dictionary was a structure type.
0
Attacker Value
Unknown

CVE-2018-16863

Disclosure Date: December 03, 2018 (last updated November 27, 2024)
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat Enterprise Linux 7.
0
Attacker Value
Unknown

CVE-2018-19477

Disclosure Date: November 23, 2018 (last updated November 08, 2023)
psi/zfjbig2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a JBIG2Decode type confusion.
0