跳转到帖子

Amazon Linux 2023: CVE-2023-43115: Important priority package update for ghostscript

recommended_posts

发布于
  • Members

Amazon Linux 2023: CVE-2023-43115: Important priority package update for ghostscript

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
09/18/2023
Created
02/14/2025
Added
02/14/2025
Modified
02/14/2025

Description

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server). A vulnerability was found in Artifex Ghostscript in gdevijs.c, allows a malicious remote attacker to perform remote code execution via crafted PostScript documents.

Solution(s)

  • amazon-linux-2023-upgrade-ghostscript
  • amazon-linux-2023-upgrade-ghostscript-debuginfo
  • amazon-linux-2023-upgrade-ghostscript-debugsource
  • amazon-linux-2023-upgrade-ghostscript-doc
  • amazon-linux-2023-upgrade-ghostscript-gtk
  • amazon-linux-2023-upgrade-ghostscript-gtk-debuginfo
  • amazon-linux-2023-upgrade-ghostscript-tools-dvipdf
  • amazon-linux-2023-upgrade-ghostscript-tools-fonts
  • amazon-linux-2023-upgrade-ghostscript-tools-printing
  • amazon-linux-2023-upgrade-ghostscript-x11
  • amazon-linux-2023-upgrade-ghostscript-x11-debuginfo
  • amazon-linux-2023-upgrade-libgs
  • amazon-linux-2023-upgrade-libgs-debuginfo
  • amazon-linux-2023-upgrade-libgs-devel

References

  • https://attackerkb.com/topics/cve-2023-43115
  • CVE - 2023-43115
  • https://alas.aws.amazon.com/AL2023/ALAS-2023-362.html
  • 查看数 707
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…