Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-8291

Опубликовано: 27 апр. 2017
Источник: debian

Описание

Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ghostscriptfixed9.20~dfsg-3.1package

Примечания

  • https://bugs.ghostscript.com/show_bug.cgi?id=697808 (duplicate of 697799)

  • https://bugs.ghostscript.com/show_bug.cgi?id=697799 (made private)

  • Full report viewable at: https://bugzilla.suse.com/show_bug.cgi?id=1036453

  • Fixed by: https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=04b37bbce174eed24edec7ad5b920eb93db4d47d

  • Fixed by: https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=4f83478c88c2e05d6e8d79ca4557eb039354d2f3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.

CVSS3: 7.3
redhat
больше 8 лет назад

Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.

CVSS3: 7.8
nvd
больше 8 лет назад

Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.

suse-cvrf
больше 8 лет назад

Security update for ghostscript-library

suse-cvrf
больше 8 лет назад

Security update for ghostscript-library