CVE-2018-15908

Related Vulnerabilities: CVE-2018-15908  

It was discovered that the ghostscript .tempfile function did not properly handle file permissions. An attacker could possibly exploit this to exploit this to bypass the -dSAFER protection and delete files or disclose their content via a specially crafted PostScript document.

It was discovered that the ghostscript .tempfile function did not properly handle file permissions. An attacker could possibly exploit this to exploit this to bypass the -dSAFER protection and delete files or disclose their content via a specially crafted PostScript document.

Find out more about CVE-2018-15908 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 7.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Low
Integrity Impact Low
Availability Impact Low

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (ghostscript) RHSA-2018:3650 2018-11-27

Affected Packages State

Platform Package State
Red Hat OpenShift Enterprise 3.2 mediawiki Not affected
Red Hat OpenShift Enterprise 3.1 mediawiki Not affected
Red Hat OpenShift Enterprise 3.0 mediawiki Not affected
Red Hat OpenShift Container Platform 3.9 mediawiki Not affected
Red Hat OpenShift Container Platform 3.7 mediawiki Not affected
Red Hat OpenShift Container Platform 3.6 mediawiki Not affected
Red Hat OpenShift Container Platform 3.5 mediawiki Not affected
Red Hat OpenShift Container Platform 3.4 mediawiki Not affected
Red Hat OpenShift Container Platform 3.3 mediawiki Not affected
Red Hat OpenShift Container Platform 3.11 mediawiki Not affected
Red Hat OpenShift Container Platform 3.10 mediawiki Not affected
Red Hat Enterprise Linux 6 ghostscript Will not fix
Red Hat Enterprise Linux 5 ghostscript Will not fix

Acknowledgements

Red Hat would like to thank Tavis Ormandy (Google Project Zero) for reporting this issue.

Mitigation

Please see https://bugzilla.redhat.com/show_bug.cgi?id=1619748#c3

External References