[arch-security] [ASA-201705-3] ghostscript: arbitrary command execution
anthraxx at archlinux.org
Wed May 10 16:16:56 UTC 2017
Arch Linux Security Advisory ASA-201705-3
Date : 2017-05-07
CVE-ID : CVE-2017-8291
Package : ghostscript
Type : arbitrary command execution
Remote : Yes
Link : https://security.archlinux.org/AVG-256
The package ghostscript before version 9.21-2 is vulnerable to
arbitrary command execution.
Upgrade to 9.21-2.
# pacman -Syu "ghostscript>=9.21-2"
The problem has been fixed upstream but no release is available yet.
It was found that ghostscript did not properly validate the parameters
passed to the .rsdparams and .eqproc functions. During its execution, a
specially crafted PostScript document could execute code via a
"/OutputFile (%pipe%" substring in the context of the ghostscript
process, bypassing the -dSAFER protection.
A remote attacker is able to execute arbitrary commands via a specially
crafted PostScript document.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: OpenPGP digital signature
More information about the arch-security