Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-43115

Опубликовано: 18 сент. 2023
Источник: debian
EPSS Средний

Описание

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ghostscriptfixed10.02.0~dfsg-1package
ghostscriptfixed10.0.0~dfsg-11+deb12u2bookwormpackage
ghostscriptfixed9.53.3~dfsg-7+deb11u6bullseyepackage
ghostscriptignoredbusterpackage

Примечания

  • https://bugs.ghostscript.com/show_bug.cgi?id=707051

  • https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=e59216049cac290fb437a04c4f41ea46826cfba5

  • https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=8b0f20002536867bd73ff4552408a72597190cbe (ghostpdl-10.02.0rc2)

EPSS

Процентиль: 95%
0.20058
Средний

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 2 года назад

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

CVSS3: 8.8
redhat
почти 2 года назад

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

CVSS3: 8.8
nvd
почти 2 года назад

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

suse-cvrf
почти 2 года назад

Security update for ghostscript

suse-cvrf
почти 2 года назад

Security update for ghostscript

EPSS

Процентиль: 95%
0.20058
Средний