Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-43115

Опубликовано: 18 сент. 2023
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

A vulnerability was found in Artifex Ghostscript in gdevijs.c, allows a malicious remote attacker to perform remote code execution via crafted PostScript documents.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6ghostscriptOut of support scope
Red Hat Enterprise Linux 7ghostscriptNot affected
Red Hat Enterprise Linux 8ghostscriptNot affected
Red Hat Enterprise Linux 8gimp:flatpak/ghostscriptNot affected
Red Hat Enterprise Linux 9ghostscriptFixedRHSA-2023:626502.11.2023
Red Hat Enterprise Linux 9ghostscriptFixedRHSA-2023:673207.11.2023
Red Hat Enterprise Linux 9.0 Extended Update SupportghostscriptFixedRHSA-2023:586818.10.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=2241108Ghostscript: GhostPDL can lead to remote code execution via crafted PostScript documents

EPSS

Процентиль: 93%
0.09902
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 2 года назад

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

CVSS3: 8.8
nvd
почти 2 года назад

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

CVSS3: 8.8
debian
почти 2 года назад

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead ...

suse-cvrf
почти 2 года назад

Security update for ghostscript

suse-cvrf
почти 2 года назад

Security update for ghostscript

EPSS

Процентиль: 93%
0.09902
Низкий

8.8 High

CVSS3