CVE-2023-43115
Published on: Not Yet Published
Last Modified on: 09/21/2023 04:27:00 PM UTC
Certain versions of Ghostscript from Artifex contain the following vulnerability:
In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).
- CVE-2023-43115 has been assigned by
[email protected] to track the vulnerability - currently rated as CRITICAL severity.
CVSS3 Score: 9.8 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
git.ghostscript.com Git - ghostpdl.git/commit | git.ghostscript.com text/xml |
![]() |
Bug Access Denied | bugs.ghostscript.com text/html |
![]() |
Ghostscript | ghostscript.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Artifex | Ghostscript | All | All | All | All |
- cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE