First published: Mon Sep 18 2023(Updated: )
In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ghostscript | <=9.27~dfsg-2+deb10u5<=9.27~dfsg-2+deb10u9<=9.53.3~dfsg-7+deb11u5<=10.0.0~dfsg-11+deb12u1 | 9.53.3~dfsg-7+deb11u6 10.0.0~dfsg-11+deb12u2 10.02.0~dfsg-2 |
Artifex Ghostscript | <=10.01.2 | |
ubuntu/ghostscript | <10.02.0~dfsg-1<10.02.0 | 10.02.0~dfsg-1 10.02.0 |
ubuntu/ghostscript | <9.50~dfsg-5ubuntu4.11 | 9.50~dfsg-5ubuntu4.11 |
ubuntu/ghostscript | <9.55.0~dfsg1-0ubuntu5.5 | 9.55.0~dfsg1-0ubuntu5.5 |
ubuntu/ghostscript | <10.0.0~dfsg1-0ubuntu1.4 | 10.0.0~dfsg1-0ubuntu1.4 |
ubuntu/ghostscript | <10.01.2~dfsg1-0ubuntu2.1 | 10.01.2~dfsg1-0ubuntu2.1 |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 |
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=e59216049cac290fb437a04c4f41ea46826cfba5
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43115 is a vulnerability in Artifex Ghostscript through 10.01.2.
CVE-2023-43115 has a severity rating of 9.8 (critical).
CVE-2023-43115 allows remote code execution via crafted PostScript documents by switching to the IJS device after SAFER has been activated.
If you are using Artifex Ghostscript version up to and including 10.01.2, your version is affected.
Yes, updating Artifex Ghostscript to a version higher than 10.01.2 will fix the vulnerability.