CVE-2016-7977Sensitive Information Exposure in Ghostscript

Severity
5.5MEDIUMNVD
EPSS
1.4%
top 19.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 23
Latest updateMay 14

Description

Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

Debianartifex/ghostscript< 9.19~dfsg-3.1+3

Patches

🔴Vulnerability Details

4
GHSA
GHSA-cvc4-qjwp-hwhc: Ghostscript before 92022-05-14
OSV
CVE-2016-7977: Ghostscript before 92017-05-23
CVEList
CVE-2016-7977: Ghostscript before 92017-05-23
OSV
ghostscript vulnerabilities2016-12-02

📋Vendor Advisories

4
Ubuntu
Ghostscript vulnerabilities2016-12-02
Red Hat
ghostscript: status command permitted with -dSAFER in psi/zfile.c allowing attackers to identify the size and existence of files2016-10-05
Red Hat
ghostscript: .libfile does not honor -dSAFER2016-09-28
Debian
CVE-2016-7977: ghostscript - Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode pr...2016

💬Community

2
Bugzilla
CVE-2016-7977 ghostscript: .libfile does not honor -dSAFER2016-09-29
Bugzilla
CVE-2015-7977 ntp: restriction list NULL pointer dereference2016-01-20
CVE-2016-7977 — Sensitive Information Exposure | cvebase