SB2018111213 - Code Injection in ghostscript (Alpine package)
Published: November 12, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Code Injection (CVE-ID: CVE-2018-17961)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation that allows sandbox bypass via error handler setup vectors. A remote attacker can pass a specially crafted PostScript file to the affected application, inject and execute arbitrary code on the target system.
Note: this vulnerability exists due to insufficient patch for previously fixed Code injection vulnerability (CVE-2018-17183).
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=b0243d03648d68851d3b5edb68da29eaae5c9f0f
- https://git.alpinelinux.org/aports/commit/?id=b38a11ee1f5109ffc2f67afa52903b9437dd4111
- https://git.alpinelinux.org/aports/commit/?id=26eef1d272a38c562dbd29a5488fb5a5efaa903e
- https://git.alpinelinux.org/aports/commit/?id=9ce86c9b20156dccf8608730175929399fa2ac9b
- https://git.alpinelinux.org/aports/commit/?id=df196f013c1754a810980f06dba86c4f9e8d1cfe
- https://git.alpinelinux.org/aports/commit/?id=38c2fab4c40672459821302e7eec434b602757b8
- https://git.alpinelinux.org/aports/commit/?id=4a52a88813303a6f82eed629efa03380141dfb5b