CVE-2017-8291

Impact:
Important
Public Date:
2017-04-26
CWE:
CWE-77
Bugzilla:
1446063: CVE-2017-8291 ghostscript: corruption of operand stack
It was found that ghostscript did not properly validate the parameters passed to the .rsdparams and .eqproc functions. During its execution, a specially crafted PostScript document could execute code in the context of the ghostscript process, bypassing the -dSAFER protection.

Find out more about CVE-2017-8291 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 7.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Low
Integrity Impact Low
Availability Impact Low

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (ghostscript) RHSA-2017:1230 2017-05-12
Red Hat Enterprise Linux 7 (ghostscript) RHSA-2017:1230 2017-05-12

Affected Packages State

Platform Package State
Red Hat OpenShift Enterprise 2 ghostscript Under investigation
Red Hat Enterprise Linux 5 ghostscript Will not fix

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.