{"id":"CVE-2018-18073","details":"Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.","modified":"2026-04-16T06:21:42.760145389Z","published":"2018-10-15T16:29:03.160Z","related":["SUSE-SU-2018:4087-1","SUSE-SU-2018:4090-1","SUSE-SU-2018:4090-2","openSUSE-SU-2024:10783-1"],"references":[{"type":"WEB","url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=34cc326eb2c5695833361887fe0b32e8d987741c"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00013.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3834"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3803-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4336"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/149758/Ghostscript-Exposed-System-Operators.html"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2018/10/10/12"},{"type":"FIX","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1690"},{"type":"FIX","url":"https://bugs.ghostscript.com/show_bug.cgi?id=699927"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-18073.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.25"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}]}