Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2018-16509

Description

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.

POC

Reference

- http://seclists.org/oss-sec/2018/q3/142

- https://www.exploit-db.com/exploits/45369/

Github

- https://github.com/0x7n6/OSCP

- https://github.com/0xStrygwyr/OSCP-Guide

- https://github.com/0xT11/CVE-POC

- https://github.com/0xZipp0/OSCP

- https://github.com/0xsyr0/OSCP

- https://github.com/AMatheusFeitosaM/OSCP-Cheat

- https://github.com/ARPSyndicate/cvemon

- https://github.com/AssassinUKG/CVE_2018_16509

- https://github.com/EnriqueSanchezdelVillar/NotesHck

- https://github.com/Faizan-Khanx/OSCP

- https://github.com/Ly0nt4r/OSCP

- https://github.com/NCSU-DANCE-Research-Group/CDL

- https://github.com/ReflectedThanatos/OSCP-cheatsheet

- https://github.com/SantoriuHen/NotesHck

- https://github.com/SenukDias/OSCP_cheat

- https://github.com/SexyBeast233/SecBooks

- https://github.com/SirElmard/ethical_hacking

- https://github.com/Threekiii/Awesome-Exploit

- https://github.com/Threekiii/Awesome-POC

- https://github.com/Threekiii/Vulhub-Reproduce

- https://github.com/VishuGahlyan/OSCP

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/bakery312/Vulhub-Reproduce

- https://github.com/barrracud4/image-upload-exploits

- https://github.com/cved-sources/cve-2018-16509

- https://github.com/e-hakson/OSCP

- https://github.com/eljosep/OSCP-Guide

- https://github.com/exfilt/CheatSheet

- https://github.com/farisv/PIL-RCE-Ghostscript-CVE-2018-16509

- https://github.com/fazilbaig1/oscp

- https://github.com/g1san/Agents-for-Vulnerable-Dockers-and-related-Benchmarks

- https://github.com/itsmiki/hackthebox-web-challenge-payloads

- https://github.com/jitmondal1/OSCP

- https://github.com/kgwanjala/oscp-cheatsheet

- https://github.com/killvxk/Awesome-Exploit

- https://github.com/knqyf263/CVE-2018-16509

- https://github.com/lnick2023/nicenice

- https://github.com/n0-traces/cve_monitor

- https://github.com/nitishbadole/oscp-note-3

- https://github.com/oscpname/OSCP_cheat

- https://github.com/parth45/cheatsheet

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/revanmalang/OSCP

- https://github.com/rhpco/CVE-2018-16509

- https://github.com/shelld3v/RCE-python-oneliner-payload

- https://github.com/superlink996/chunqiuyunjingbachang

- https://github.com/txuswashere/OSCP

- https://github.com/xbl3/awesome-cve-poc_qazbnm456

- https://github.com/xhref/OSCP