SB2023101289 - Multiple vulnerabilities in Artifex Ghostscript
Published: October 12, 2023 Updated: March 4, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Use of Potentially Dangerous Function (CVE-ID: CVE-2023-43115)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists in gdevijs.c in GhostPDL due to the way PostScript handles IJS device change. A remote attacker can trick the victim to open a specially crafted document that will switch to the IJS device, start the IJS server and execute arbitrary commands on the system.
2) Integer overflow (CVE-ID: CVE-2023-38560)
The vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to integer overflow within the pl_glyph_name() function in pcl/pl/plfont.c when converting PCL files to PDF format. A remote attacker can pass a specially crafted PLC file to the application, trigger an integer overflow and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://bugs.ghostscript.com/show_bug.cgi?id=707051
- https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=e59216049cac290fb437a04c4f41ea46826cfba5
- https://ghostscript.com/
- https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=b7eb1d0174c
- https://access.redhat.com/security/cve/CVE-2023-38560
- https://bugzilla.redhat.com/show_bug.cgi?id=2224368
- https://bugs.ghostscript.com/show_bug.cgi?id=706898