CVE-2017-8291
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- April 26, 2017
- Published Date
- April 27, 2017
- Last Updated
- February 04, 2025
- Vendor
- n/a
- Product
- n/a
- Description
- Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
CVSS Scores
CVSS v3.1
7.8 - HIGH
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
SSVC Information
- Exploitation
- active
- Technical Impact
- total
References
http://www.debian.org/security/2017/dsa-3838
https://bugzilla.suse.com/show_bug.cgi?id=1036453
https://access.redhat.com/errata/RHSA-2017:1230
http://www.securityfocus.com/bid/98476
https://www.exploit-db.com/exploits/41955/
http://openwall.com/lists/oss-security/2017/04/28/2
https://security.gentoo.org/glsa/201708-06
https://bugzilla.redhat.com/show_bug.cgi?id=1446063
https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=04b37bbce174eed24edec7ad5b920eb93db4d47d
https://bugs.ghostscript.com/show_bug.cgi?id=697808
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2022-05-24 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
shun1403/PIL-CVE-2017-8291-study
Type: github • Created: 2025-04-27 11:11:22 UTC • Stars: 0
shun1403/CVE-2017-8291
Type: github • Created: 2025-04-27 09:04:54 UTC • Stars: 0