Added |
CVSS V3 |
|
AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
Added |
CVSS V2 |
|
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
|
Added |
CWE |
|
CWE-20
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:* versions up to (including) 9.26
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
*cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
*cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
*cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
|
Changed |
Reference Type |
http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00047.html No Types Assigned
|
http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00047.html Third Party Advisory
|
Changed |
Reference Type |
http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00048.html No Types Assigned
|
http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00048.html Third Party Advisory
|
Changed |
Reference Type |
http://packetstormsecurity.com/files/151307/Ghostscript-Pseudo-Operator-Remote-Code-Execution.html No Types Assigned
|
http://packetstormsecurity.com/files/151307/Ghostscript-Pseudo-Operator-Remote-Code-Execution.html Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://www.openwall.com/lists/oss-security/2019/01/23/5 No Types Assigned
|
http://www.openwall.com/lists/oss-security/2019/01/23/5 Exploit, Mailing List, Patch, Third Party Advisory
|
Changed |
Reference Type |
http://www.openwall.com/lists/oss-security/2019/03/21/1 No Types Assigned
|
http://www.openwall.com/lists/oss-security/2019/03/21/1 Mailing List, Patch, Third Party Advisory
|
Changed |
Reference Type |
http://www.securityfocus.com/bid/106700 No Types Assigned
|
http://www.securityfocus.com/bid/106700 Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
https://access.redhat.com/errata/RHSA-2019:0229 No Types Assigned
|
https://access.redhat.com/errata/RHSA-2019:0229 Third Party Advisory
|
Changed |
Reference Type |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1729 No Types Assigned
|
https://bugs.chromium.org/p/project-zero/issues/detail?id=1729 Exploit, Issue Tracking, Patch, Third Party Advisory
|
Changed |
Reference Type |
https://bugs.ghostscript.com/show_bug.cgi?id=700317 No Types Assigned
|
https://bugs.ghostscript.com/show_bug.cgi?id=700317 Exploit, Issue Tracking, Patch, Third Party Advisory
|
Changed |
Reference Type |
https://lists.debian.org/debian-lts-announce/2019/02/msg00016.html No Types Assigned
|
https://lists.debian.org/debian-lts-announce/2019/02/msg00016.html Mailing List, Third Party Advisory
|
Changed |
Reference Type |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7N6T5L3SSJX2AVUPHP7GCPATFWUPKZT2/ No Types Assigned
|
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7N6T5L3SSJX2AVUPHP7GCPATFWUPKZT2/ Third Party Advisory
|
Changed |
Reference Type |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWVAVCDXBLPLJMVGNSKGGDTBEOHCJBKK/ No Types Assigned
|
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWVAVCDXBLPLJMVGNSKGGDTBEOHCJBKK/ Third Party Advisory
|
Changed |
Reference Type |
https://usn.ubuntu.com/3866-1/ No Types Assigned
|
https://usn.ubuntu.com/3866-1/ Third Party Advisory
|
Changed |
Reference Type |
https://www.debian.org/security/2019/dsa-4372 No Types Assigned
|
https://www.debian.org/security/2019/dsa-4372 Third Party Advisory
|
Changed |
Reference Type |
https://www.exploit-db.com/exploits/46242/ No Types Assigned
|
https://www.exploit-db.com/exploits/46242/ Exploit, Third Party Advisory, VDB Entry
|
Added |
CVSS V2 Metadata |
|
Victim must voluntarily interact with attack mechanism
|