First published: Thu Sep 28 2023(Updated: )
In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. References: <a href="https://bugs.ghostscript.com/show_bug.cgi?id=707051">https://bugs.ghostscript.com/show_bug.cgi?id=707051</a> <a href="https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=e59216049cac290fb437a04c4f41ea46826cfba5">https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=e59216049cac290fb437a04c4f41ea46826cfba5</a> <a href="https://ghostscript.com/">https://ghostscript.com/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ghostscript | <=10.01.2 | |
Artifex GhostPDL | <=10.01.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2241108 is critical due to its potential for remote code execution.
To fix REDHAT-BUG-2241108, update Artifex Ghostscript and GhostPDL to versions higher than 10.01.2.
Artifex Ghostscript and GhostPDL versions up to and including 10.01.2 are affected by REDHAT-BUG-2241108.
REDHAT-BUG-2241108 allows an attacker to execute remote code via specially crafted PostScript documents.
Yes, REDHAT-BUG-2241108 is related to the IJS device functionality and its interaction with the SAFER security model.