⚠ Actively exploited
Added to CISA KEV on 2022-05-24. Federal agencies required to patch by 2022-06-14. Required action: Apply updates per vendor instructions..
CVE-2017-8291 — Type Confusion in Ghostscript
Severity
7.8HIGHNVD
OSV5.5
EPSS
92.9%
top 0.23%
CISA KEV
KEV
Added 2022-05-24
Due 2022-06-14
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedApr 27
KEV addedMay 24
KEV dueJun 14
CISA Required Action: Apply updates per vendor instructions.
Description
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages6 packages
Also affects: Debian Linux 8.0, Enterprise Linux 7.3, 7.4, 7.5, 7.6, 7.7
Patches
🔴Vulnerability Details
6GHSA▶
GHSA-rh88-cwv2-gjxm: Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via↗2022-05-14
OSV▶
CVE-2017-8291: Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via↗2017-04-27
CVEList▶
CVE-2017-8291: Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via↗2017-04-27