Ghostscript: Multiple arbitrary code execution vulns
Steve Kinney
admin at pilobilus.net
Sun Aug 26 13:48:43 PDT 2018
Just when you thought there was a "safe" graphic document format...
CERT says:
https://www.kb.cert.org/vuls/id/332928
A similar problem in ghostscript, fixed in 2006:
http://seclists.org/oss-sec/2016/q4/29
Tech press says:
https://threatpost.com/unpatched-ghostscript-flaws-allow-remote-takeover-of-systems/136800/
Not sure about the "take total control" part unless a payload can trick
the user into entering the root password in a bogus dialog on the
desktop: Nothing that uses ghostscript /should/ have administrator
privileges. Isn't a family of exploits that can do everything the user
can do in a terminal bad enough?
So until patch, no u view PDF or PS dox from unknown source, untrusted
source, or passed thorough insecure network.
No reports of exploits in the wild as yet.
:o/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: OpenPGP digital signature
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20180826/5e8bdd13/attachment.sig>
More information about the cypherpunks
mailing list