← Retour aux CVEs
CVE-2017-8291
HIGHCISA KEV7.8
Description
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
Details CVE
Score CVSS v3.17.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurREQUIRED
Publie4/27/2017
Derniere modification4/21/2026
Sourcekev
Observations honeypot0
CISA KEV
FournisseurArtifex
ProduitGhostscript
Nom vulnerabiliteArtifex Ghostscript Type Confusion Vulnerability
Date ajout KEV2022-05-24
Date limite remediation2022-06-14
Utilise dans ransomwareUnknown
Produits affectes
artifex:ghostscriptdebian:debian_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstation
Faiblesses (CWE)
CWE-843CWE-843
References
http://openwall.com/lists/oss-security/2017/04/28/2(cve@mitre.org)
http://www.debian.org/security/2017/dsa-3838(cve@mitre.org)
http://www.securityfocus.com/bid/98476(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1230(cve@mitre.org)
https://bugs.ghostscript.com/show_bug.cgi?id=697808(cve@mitre.org)
https://bugzilla.redhat.com/show_bug.cgi?id=1446063(cve@mitre.org)
https://bugzilla.suse.com/show_bug.cgi?id=1036453(cve@mitre.org)
https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=04b37bbce174eed24edec7ad5b920eb93db4d47d(cve@mitre.org)
https://security.gentoo.org/glsa/201708-06(cve@mitre.org)
https://www.exploit-db.com/exploits/41955/(cve@mitre.org)
http://openwall.com/lists/oss-security/2017/04/28/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2017/dsa-3838(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/98476(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1230(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.ghostscript.com/show_bug.cgi?id=697808(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1446063(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.suse.com/show_bug.cgi?id=1036453(af854a3a-2127-422b-91ae-364da2661108)
https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=04b37bbce174eed24edec7ad5b920eb93db4d47d(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201708-06(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/41955/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-8291(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.