Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-33869

Опубликовано: 03 июл. 2024
Источник: debian
EPSS Низкий

Описание

An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ghostscriptfixed10.03.1~dfsg~git20240518-1package
ghostscriptnot-affectedbusterpackage

Примечания

  • https://ghostscript.readthedocs.io/en/gs10.03.1/News.html

  • https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=5ae2e320d69a7d0973011796bd388cd5befa1a43 (ghostpdl-10.03.1)

  • https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f5336e5b4154f515ac83bc5b9eba94302e6618d4 (ghostpdl-10.03.1)

  • https://bugs.ghostscript.com/show_bug.cgi?id=707691

EPSS

Процентиль: 6%
0.00028
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
12 месяцев назад

An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.

CVSS3: 5.3
redhat
около 1 года назад

An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.

CVSS3: 5.3
nvd
12 месяцев назад

An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.

CVSS3: 5.3
github
12 месяцев назад

An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.

CVSS3: 8.8
fstec
12 месяцев назад

Уязвимость файла base/gpmisc.c набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с неправильной проверкой входных данных, позволяющая нарушителю выполнить произвольный код в системе

EPSS

Процентиль: 6%
0.00028
Низкий