Описание
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
Ссылки
- Mailing ListPatchThird Party Advisory
- Mailing ListThird Party Advisory
- Broken LinkThird Party AdvisoryVDB Entry
- Third Party Advisory
- Issue TrackingThird Party AdvisoryVDB Entry
- Issue TrackingPatchThird Party AdvisoryVDB Entry
- ExploitIssue TrackingThird Party AdvisoryVDB Entry
- Broken Link
- Third Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- Mailing ListPatchThird Party Advisory
- Mailing ListThird Party Advisory
- Broken LinkThird Party AdvisoryVDB Entry
- Third Party Advisory
- Issue TrackingThird Party AdvisoryVDB Entry
- Issue TrackingPatchThird Party AdvisoryVDB Entry
- ExploitIssue TrackingThird Party AdvisoryVDB Entry
- Broken Link
- Third Party Advisory
- ExploitThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Одно из
EPSS
7.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
Связанные уязвимости
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remot ...
EPSS
7.8 High
CVSS3
6.8 Medium
CVSS2