Ghostscript: Multiple arbitrary code execution vulns

Steve Kinney admin at pilobilus.net
Sun Aug 26 13:48:43 PDT 2018



Just when you thought there was a "safe" graphic document format...

CERT says:

https://www.kb.cert.org/vuls/id/332928


A similar problem in ghostscript, fixed in 2006:

http://seclists.org/oss-sec/2016/q4/29


Tech press says:

https://threatpost.com/unpatched-ghostscript-flaws-allow-remote-takeover-of-systems/136800/

Not sure about the "take total control" part unless a payload can trick
the user into entering the root password in a bogus dialog on the
desktop:  Nothing that uses ghostscript /should/ have administrator
privileges.  Isn't a family of exploits that can do everything the user
can do in a terminal bad enough?

So until patch, no u view PDF or PS dox from unknown source, untrusted
source, or passed thorough insecure network.

No reports of exploits in the wild as yet.

:o/






-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: OpenPGP digital signature
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20180826/5e8bdd13/attachment.sig>


More information about the cypherpunks mailing list