CVE-2023-36664Files or Directories Accessible to External Parties in Ghostscript

Severity
7.8HIGHNVD
EPSS
6.4%
top 8.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 25
Latest updateJul 10

Description

Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debianartifex/ghostscript< 9.53.3~dfsg-7+deb11u5+3
NVDartifex/ghostscript10.01.2

Also affects: Debian Linux 11.0, 12.0, Fedora 37, 38

🔴Vulnerability Details

3
GHSA
GHSA-9gf6-5j7x-x3m9: Artifex Ghostscript through 102023-06-26
OSV
CVE-2023-36664: Artifex Ghostscript through 102023-06-25
CVEList
CVE-2023-36664: Artifex Ghostscript through 102023-06-25

📋Vendor Advisories

3
Ubuntu
Ghostscript vulnerability2023-07-10
Red Hat
ghostscript: vulnerable to OS command injection due to mishandles permission validation for pipe devices2023-06-27
Debian
CVE-2023-36664: ghostscript - Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe de...2023
CVE-2023-36664 — Artifex Ghostscript vulnerability | cvebase