CVE-2024-33869

An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
5.3 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 6%
VendorProductVersion
artifexghostscript
𝑥
< 10.03.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ghostscript
bullseye
9.53.3~dfsg-7+deb11u7
fixed
buster
not-affected
bullseye (security)
9.53.3~dfsg-7+deb11u10
fixed
bookworm
10.0.0~dfsg-11+deb12u7
fixed
bookworm (security)
10.0.0~dfsg-11+deb12u7
fixed
sid
10.05.1~dfsg-1
fixed
trixie
10.05.1~dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ghostscript
plucky
Fixed 10.02.1~dfsg1-0ubuntu9
released
oracular
Fixed 10.02.1~dfsg1-0ubuntu9
released
noble
Fixed 10.02.1~dfsg1-0ubuntu7.1
released
mantic
Fixed 10.01.2~dfsg1-0ubuntu2.3
released
jammy
Fixed 9.55.0~dfsg1-0ubuntu5.7
released
focal
Fixed 9.50~dfsg-5ubuntu4.12
released
bionic
needs-triage
xenial
needs-triage