First published: Wed Sep 08 2021(Updated: )
A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex Ghostscript | =9.50 | |
Artifex Ghostscript | =9.52 | |
Artifex Ghostscript | =9.53.3 | |
Artifex Ghostscript | =9.54.0 | |
Fedoraproject Fedora | =34 | |
redhat/ghostpdl | <9.55.0 | 9.55.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3781 is a vulnerability found in the ghostscript interpreter that allows a specially crafted document to execute arbitrary commands on the system.
CVE-2021-3781 has a severity rating of 9.9 (Critical).
CVE-2021-3781 affects the following versions of Artifex Ghostscript: 9.50, 9.52, 9.53.3, and 9.54.0.
To fix CVE-2021-3781, it is recommended to update Artifex Ghostscript to a patched version provided by the vendor.
You can find more information about CVE-2021-3781 in the references provided: [Reference 1](https://bugzilla.redhat.com/show_bug.cgi?id=2002271), [Reference 2](https://ghostscript.com/CVE-2021-3781.html), [Reference 3](https://security.gentoo.org/glsa/202211-11).