CVE-2018-16509
HIGH EXPLOITED IN THE WILDArtifex Ghostscript <9.24 - Privilege Escalation
Title source: llmDescription
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.
Exploits (6)
nomisec
WORKING POC
58 stars
by farisv · remote-auth
https://github.com/farisv/PIL-RCE-Ghostscript-CVE-2018-16509
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocallinux
https://www.exploit-db.com/exploits/45369
metasploit
WORKING POC
EXCELLENT
by Tavis Ormandy, wvu · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/fileformat/ghostscript_failed_restore.rb
References (15)
Scores
CVSS v3
7.8
EPSS
0.9176
EPSS Percentile
99.7%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2024-05-10
InTheWild.io
2024-05-17
Classification
Status
published
Affected Products (14)
debian/debian_linux
debian/debian_linux
artifex/ghostscript
< 9.24
canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
redhat/enterprise_linux_desktop
redhat/enterprise_linux_desktop
redhat/enterprise_linux_server
redhat/enterprise_linux_server
redhat/enterprise_linux_server_eus
redhat/enterprise_linux_workstation
redhat/enterprise_linux_workstation
artifex/gpl_ghostscript
< 9.26
Timeline
Published
Sep 05, 2018
Tracked Since
Feb 18, 2026