![](https://secure.gravatar.com/avatar/3cf9b2560526f31748ebf017042be6df.jpg?s=120&d=mm&r=g)
Just when you thought there was a "safe" graphic document format... CERT says: https://www.kb.cert.org/vuls/id/332928 A similar problem in ghostscript, fixed in 2006: http://seclists.org/oss-sec/2016/q4/29 Tech press says: https://threatpost.com/unpatched-ghostscript-flaws-allow-remote-takeover-of-... Not sure about the "take total control" part unless a payload can trick the user into entering the root password in a bogus dialog on the desktop: Nothing that uses ghostscript /should/ have administrator privileges. Isn't a family of exploits that can do everything the user can do in a terminal bad enough? So until patch, no u view PDF or PS dox from unknown source, untrusted source, or passed thorough insecure network. No reports of exploits in the wild as yet. :o/