Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9p55-888j-qxrh

Опубликовано: 18 сент. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

EPSS

Процентиль: 95%
0.20058
Средний

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 2 года назад

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

CVSS3: 8.8
redhat
почти 2 года назад

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

CVSS3: 8.8
nvd
почти 2 года назад

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

CVSS3: 8.8
debian
почти 2 года назад

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead ...

suse-cvrf
почти 2 года назад

Security update for ghostscript

EPSS

Процентиль: 95%
0.20058
Средний

9.8 Critical

CVSS3