Advisory Published
Updated

CVE-2023-43115

First published: Mon Sep 18 2023(Updated: )

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
debian/ghostscript<=9.27~dfsg-2+deb10u5<=9.27~dfsg-2+deb10u9<=9.53.3~dfsg-7+deb11u5<=10.0.0~dfsg-11+deb12u1
9.53.3~dfsg-7+deb11u6
10.0.0~dfsg-11+deb12u2
10.02.0~dfsg-2
Artifex Ghostscript<=10.01.2
ubuntu/ghostscript<10.02.0~dfsg-1<10.02.0
10.02.0~dfsg-1
10.02.0
ubuntu/ghostscript<9.50~dfsg-5ubuntu4.11
9.50~dfsg-5ubuntu4.11
ubuntu/ghostscript<9.55.0~dfsg1-0ubuntu5.5
9.55.0~dfsg1-0ubuntu5.5
ubuntu/ghostscript<10.0.0~dfsg1-0ubuntu1.4
10.0.0~dfsg1-0ubuntu1.4
ubuntu/ghostscript<10.01.2~dfsg1-0ubuntu2.1
10.01.2~dfsg1-0ubuntu2.1
Fedoraproject Fedora=38
Fedoraproject Fedora=39

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2023-43115?

    CVE-2023-43115 is a vulnerability in Artifex Ghostscript through 10.01.2.

  • How severe is CVE-2023-43115?

    CVE-2023-43115 has a severity rating of 9.8 (critical).

  • How does CVE-2023-43115 lead to remote code execution?

    CVE-2023-43115 allows remote code execution via crafted PostScript documents by switching to the IJS device after SAFER has been activated.

  • How can I check if my version of Ghostscript is affected?

    If you are using Artifex Ghostscript version up to and including 10.01.2, your version is affected.

  • Is there a fix for CVE-2023-43115?

    Yes, updating Artifex Ghostscript to a version higher than 10.01.2 will fix the vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203