Description
In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).
Published: 2023-09-18
Score: 8.8 High
EPSS: 21.7% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-6433-1 Ghostscript vulnerability
History

No history.

Subscriptions

Artifex Ghostscript
Fedoraproject Fedora
Redhat Enterprise Linux Rhel Eus
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T19:37:23.079Z

Reserved: 2023-09-18T00:00:00.000Z

Link: CVE-2023-43115

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-09-18T08:15:07.380

Modified: 2024-11-21T08:23:43.127

Link: CVE-2023-43115

cve-icon Redhat

Severity : Important

Publid Date: 2023-09-18T00:00:00Z

Links: CVE-2023-43115 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses