CVE-2017-8291 (retired)

Priority
Description
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote
command execution via .rsdparams type confusion with a "/OutputFile
(%pipe%" substring in a crafted .eps document that is an input to the gs
program, as exploited in the wild in April 2017.
Notes
 sbeattie> introduced regression (LP: #1687614); needs upstream commits
  57f20719e1cfaea77b67cb26e26de7fe4d7f9b2e and
  ccfd2c75ac9be4cbd369e4cbdd40ba11a0c7bdad
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was released [9.05~dfsg-0ubuntu4.5])
Ubuntu 14.04 LTS (Trusty Tahr):released (9.10~dfsg-0ubuntu10.7)
Ubuntu 16.04 LTS (Xenial Xerus):released (9.18~dfsg~0-0ubuntu2.4)
Patches:
Upstream:https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=4f83478c88
Upstream:https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=04b37bbce1
More Information

Updated: 2019-03-26 12:26:32 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)