Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/149758/Ghostscript-Exposed-System-Operators.html | vdb entry third party advisory |
https://bugs.ghostscript.com/show_bug.cgi?id=699927 | issue tracking patch vendor advisory |
https://access.redhat.com/errata/RHSA-2018:3834 | third party advisory vendor advisory |
https://usn.ubuntu.com/3803-1/ | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2018/10/10/12 | mailing list third party advisory patch |
https://www.debian.org/security/2018/dsa-4336 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/10/msg00013.html | third party advisory mailing list |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1690 | issue tracking third party advisory patch |
http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=34cc326eb2c5695833361887fe0b32e8d987741c |