CVE-2018-17961

HIGH

Artifex Ghostscript < 9.25 - Error Information Exposure

Title source: rule
STIX 2.1

Description

Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Google Security Research · textlocallinux
https://www.exploit-db.com/exploits/45573
nomisec STUB 2 stars
by matlink · poc
https://github.com/matlink/CVE-2018-17961

References (11)

Core 11
Core References
Exploit, Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2018/10/09/4
Permissions Required, Third Party Advisory x_refsource_confirm
https://bugs.ghostscript.com/show_bug.cgi?id=699816
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:3834
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3803-1/
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2018/dsa-4336
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/10/msg00013.html
Exploit, Third Party Advisory, VDB Entry exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/45573/
Patch, Third Party Advisory x_refsource_misc
https://bugs.chromium.org/p/project-zero/issues/detail?id=1682&desc=2

Scores

CVSS v3 8.6
EPSS 0.1133
EPSS Percentile 93.6%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Details

CWE
CWE-209
Status published
Products (13)
artifex/ghostscript < 9.25
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 18.10
debian/debian_linux 8.0
debian/debian_linux 9.0
redhat/enterprise_linux_desktop 7.0
redhat/enterprise_linux_server 7.0
redhat/enterprise_linux_server_aus 7.6
... and 3 more
Published Oct 15, 2018
Tracked Since Feb 18, 2026