[Secure-testing-team] Bug#861295: ghostscript: CVE-2017-8291: shell injection

Salvatore Bonaccorso carnil at debian.org
Thu Apr 27 05:03:05 UTC 2017


Source: ghostscript
Version: 9.06~dfsg-2
Severity: grave
Tags: upstream security
Justification: user security hole
Forwarded: https://bugs.ghostscript.com/show_bug.cgi?id=697808

Hi,

the following vulnerability was published for ghostscript.

CVE-2017-8291[0]:
| Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote
| command execution via a "/OutputFile (%pipe%" substring in a crafted
| .eps document that is an input to the gs program, as exploited in the
| wild in April 2017.

Regading the CVE assignment, note that it is psecific to the shell
injection, as per
https://bugs.ghostscript.com/show_bug.cgi?id=697808#c1 if the
segmentation violation that is seen when executing this sample
represents a second security issue then it will get a second CVE.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-8291
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291
[1] https://bugs.ghostscript.com/show_bug.cgi?id=697808

Regards,
Salvatore



More information about the Secure-testing-team mailing list