Artifex

Ghostscript

129 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.43%
  • Veröffentlicht 05.09.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:52:56

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.

  • EPSS 0.26%
  • Veröffentlicht 05.09.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:52:53

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.

Exploit
  • EPSS 91.74%
  • Veröffentlicht 05.09.2018 06:29:00
  • Zuletzt bearbeitet 21.11.2024 03:52:52

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instr...

  • EPSS 0.22%
  • Veröffentlicht 05.09.2018 06:29:00
  • Zuletzt bearbeitet 21.11.2024 03:52:52

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the "CS" and "SC" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other im...

  • EPSS 0.37%
  • Veröffentlicht 05.09.2018 06:29:00
  • Zuletzt bearbeitet 21.11.2024 03:52:52

An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.

  • EPSS 2.7%
  • Veröffentlicht 28.08.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:42

In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.

  • EPSS 0.23%
  • Veröffentlicht 27.08.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:41

In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.

  • EPSS 2.27%
  • Veröffentlicht 27.08.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:41

In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.

  • EPSS 4.83%
  • Veröffentlicht 27.08.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:42

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.

  • EPSS 0.54%
  • Veröffentlicht 01.06.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:45

psi/zfile.c in Artifex Ghostscript before 9.21rc1 permits the status command even if -dSAFER is used, which might allow remote attackers to determine the existence and size of arbitrary files, a similar issue to CVE-2016-7977.