VYPR

rpm package

suse/ghostscript&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP1

pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1

Vulnerabilities (44)

  • CVE-2018-16585Sep 6, 2018
    affected < 9.25-23.13.1fixed 9.25-23.13.1

    An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to s

  • CVE-2018-16543Sep 5, 2018
    affected < 9.25-23.13.1fixed 9.25-23.13.1

    In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact.

  • CVE-2018-16542Sep 5, 2018
    affected < 9.25-23.13.1fixed 9.25-23.13.1

    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.

  • CVE-2018-16541Sep 5, 2018
    affected < 9.25-23.13.1fixed 9.25-23.13.1

    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.

  • CVE-2018-16540Sep 5, 2018
    affected < 9.25-23.13.1fixed 9.25-23.13.1

    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.

  • CVE-2018-16539Sep 5, 2018
    affected < 9.25-23.13.1fixed 9.25-23.13.1

    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.

  • CVE-2018-16513Sep 5, 2018
    affected < 9.25-23.13.1fixed 9.25-23.13.1

    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.

  • CVE-2018-16511Sep 5, 2018
    affected < 9.25-23.13.1fixed 9.25-23.13.1

    An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.

  • CVE-2018-16510Sep 5, 2018
    affected < 9.25-23.13.1fixed 9.25-23.13.1

    An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the "CS" and "SC" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact.

  • CVE-2018-16509Sep 5, 2018
    affected < 9.25-23.13.1fixed 9.25-23.13.1

    An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.

  • CVE-2018-15911Aug 28, 2018
    affected < 9.25-23.13.1fixed 9.25-23.13.1

    In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.

  • CVE-2018-15910Aug 27, 2018
    affected < 9.25-23.13.1fixed 9.25-23.13.1

    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.

  • CVE-2018-15909Aug 27, 2018
    affected < 9.25-23.13.1fixed 9.25-23.13.1

    In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.

  • CVE-2018-15908Aug 27, 2018
    affected < 9.25-23.13.1fixed 9.25-23.13.1

    In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.

  • CVE-2016-9601Apr 23, 2018
    affected < 9.15-20.1fixed 9.15-20.1

    ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, j

  • CVE-2016-7979CriMay 23, 2017
    affected < 9.15-11.1fixed 9.15-11.1

    Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initialize_dsc_parser.

  • CVE-2016-7978CriMay 23, 2017
    affected < 9.15-11.1fixed 9.15-11.1

    Use-after-free vulnerability in Ghostscript 9.20 might allow remote attackers to execute arbitrary code via vectors related to a reference leak in .setdevice.

  • CVE-2017-8291HigKEVApr 27, 2017
    affected < 9.15-20.1fixed 9.15-20.1

    Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.

  • CVE-2016-8602HigApr 14, 2017
    affected < 9.15-14.1fixed 9.15-14.1

    The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Postscript document that calls .sethalftone5 with an empty operand stack.

  • CVE-2017-5951MedApr 3, 2017
    affected < 9.15-20.1fixed 9.15-20.1

    The mem_get_bits_rectangle function in base/gdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.