Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-33871

Опубликовано: 02 мая 2024
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

An issue was discovered in Artifex Ghostscript before 10.03.1. contrib/opvp/gdevopvp.c allows arbitrary code execution via a custom Driver library, exploitable via a crafted PostScript document. This occurs because the Driver parameter for opvp (and oprp) devices can have an arbitrary name for a dynamic library; this library is then loaded.

A flaw was found in Ghostscript. The "Driver" parameter for the "opvp"/"oprp" device specifies the name of a dynamic library and allows any library to be loaded. This flaw allows a malicious user to send a specially crafted document that, when processed by Ghostscript, could potentially lead to arbitrary code execution with the privileges of the Ghostscript process on the system.

Меры по смягчению последствий

Passing the -dSAFER safety argument on the command line prevents the issue by locking security-related variables after Ghostscript’s initialization. In RHEL 9, -dSAFER is enabled by default, ensuring that insecure commands are rejected in a safer environment. This mitigation is equally effective in RHEL 7 and 8 when -dSAFER is explicitly passed on the command line, addressing the vulnerability that allows insecure commands within PostScript files. Since the OPVP device, cannot be removed, we recommend to use -dSAFER in RHEL 7 and 8 as a practical security measure.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10ghostscriptNot affected
Red Hat Enterprise Linux 6ghostscriptOut of support scope
Red Hat Enterprise Linux 8gimp:flatpak/ghostscriptAffected
Red Hat Enterprise Linux 7 Extended Lifecycle SupportghostscriptFixedRHSA-2024:454915.07.2024
Red Hat Enterprise Linux 8ghostscriptFixedRHSA-2024:400020.06.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportghostscriptFixedRHSA-2024:453715.07.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportghostscriptFixedRHSA-2024:454415.07.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceghostscriptFixedRHSA-2024:454415.07.2024
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsghostscriptFixedRHSA-2024:454415.07.2024
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportghostscriptFixedRHSA-2024:446210.07.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2283508ghostscript: OPVP device arbitrary code execution via custom Driver library

EPSS

Процентиль: 69%
0.00635
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
12 месяцев назад

An issue was discovered in Artifex Ghostscript before 10.03.1. contrib/opvp/gdevopvp.c allows arbitrary code execution via a custom Driver library, exploitable via a crafted PostScript document. This occurs because the Driver parameter for opvp (and oprp) devices can have an arbitrary name for a dynamic library; this library is then loaded.

CVSS3: 8.8
nvd
12 месяцев назад

An issue was discovered in Artifex Ghostscript before 10.03.1. contrib/opvp/gdevopvp.c allows arbitrary code execution via a custom Driver library, exploitable via a crafted PostScript document. This occurs because the Driver parameter for opvp (and oprp) devices can have an arbitrary name for a dynamic library; this library is then loaded.

CVSS3: 8.8
debian
12 месяцев назад

An issue was discovered in Artifex Ghostscript before 10.03.1. contrib ...

suse-cvrf
12 месяцев назад

Security update for ghostscript

suse-cvrf
12 месяцев назад

Security update for ghostscript

EPSS

Процентиль: 69%
0.00635
Низкий

8.8 High

CVSS3