← Back to CVEs
CVE-2017-8291
HIGHCISA KEV7.8
Description
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
CVE Details
CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published4/27/2017
Last Modified4/21/2026
Sourcekev
Honeypot Sightings0
CISA KEV
VendorArtifex
ProductGhostscript
Vulnerability NameArtifex Ghostscript Type Confusion Vulnerability
KEV Date Added2022-05-24
Remediation Due Date2022-06-14
Ransomware UseUnknown
Affected Products
artifex:ghostscriptdebian:debian_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstation
Weaknesses (CWE)
CWE-843CWE-843
References
http://openwall.com/lists/oss-security/2017/04/28/2(cve@mitre.org)
http://www.debian.org/security/2017/dsa-3838(cve@mitre.org)
http://www.securityfocus.com/bid/98476(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1230(cve@mitre.org)
https://bugs.ghostscript.com/show_bug.cgi?id=697808(cve@mitre.org)
https://bugzilla.redhat.com/show_bug.cgi?id=1446063(cve@mitre.org)
https://bugzilla.suse.com/show_bug.cgi?id=1036453(cve@mitre.org)
https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=04b37bbce174eed24edec7ad5b920eb93db4d47d(cve@mitre.org)
https://security.gentoo.org/glsa/201708-06(cve@mitre.org)
https://www.exploit-db.com/exploits/41955/(cve@mitre.org)
http://openwall.com/lists/oss-security/2017/04/28/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2017/dsa-3838(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/98476(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1230(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.ghostscript.com/show_bug.cgi?id=697808(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1446063(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.suse.com/show_bug.cgi?id=1036453(af854a3a-2127-422b-91ae-364da2661108)
https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=04b37bbce174eed24edec7ad5b920eb93db4d47d(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201708-06(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/41955/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-8291(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.