CVE-2023-43115

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
VendorProductVersion
artifexghostscript
𝑥
≤ 10.01.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ghostscript
bullseye
9.53.3~dfsg-7+deb11u7
fixed
buster
ignored
bullseye (security)
9.53.3~dfsg-7+deb11u9
fixed
bookworm
10.0.0~dfsg-11+deb12u5
fixed
bookworm (security)
10.0.0~dfsg-11+deb12u6
fixed
trixie
10.04.0~dfsg-2
fixed
sid
10.04.0~dfsg-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ghostscript
mantic
Fixed 10.01.2~dfsg1-0ubuntu2.1
released
lunar
Fixed 10.0.0~dfsg1-0ubuntu1.4
released
jammy
Fixed 9.55.0~dfsg1-0ubuntu5.5
released
focal
Fixed 9.50~dfsg-5ubuntu4.11
released
bionic
ignored
xenial
ignored
trusty
ignored