← Volver a CVEs
CVE-2017-8291
HIGHCISA KEV7.8
Descripcion
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
Detalles CVE
Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado4/27/2017
Ultima modificacion4/21/2026
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorArtifex
ProductoGhostscript
Nombre vulnerabilidadArtifex Ghostscript Type Confusion Vulnerability
Fecha inclusion KEV2022-05-24
Fecha limite remediacion2022-06-14
Uso en ransomwareUnknown
Productos afectados
artifex:ghostscriptdebian:debian_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstation
Debilidades (CWE)
CWE-843CWE-843
Referencias
http://openwall.com/lists/oss-security/2017/04/28/2(cve@mitre.org)
http://www.debian.org/security/2017/dsa-3838(cve@mitre.org)
http://www.securityfocus.com/bid/98476(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1230(cve@mitre.org)
https://bugs.ghostscript.com/show_bug.cgi?id=697808(cve@mitre.org)
https://bugzilla.redhat.com/show_bug.cgi?id=1446063(cve@mitre.org)
https://bugzilla.suse.com/show_bug.cgi?id=1036453(cve@mitre.org)
https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=04b37bbce174eed24edec7ad5b920eb93db4d47d(cve@mitre.org)
https://security.gentoo.org/glsa/201708-06(cve@mitre.org)
https://www.exploit-db.com/exploits/41955/(cve@mitre.org)
http://openwall.com/lists/oss-security/2017/04/28/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2017/dsa-3838(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/98476(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1230(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.ghostscript.com/show_bug.cgi?id=697808(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1446063(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.suse.com/show_bug.cgi?id=1036453(af854a3a-2127-422b-91ae-364da2661108)
https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=04b37bbce174eed24edec7ad5b920eb93db4d47d(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201708-06(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/41955/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-8291(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.