SB2023101289 - Multiple vulnerabilities in Artifex Ghostscript



SB2023101289 - Multiple vulnerabilities in Artifex Ghostscript

Published: October 12, 2023 Updated: March 4, 2025

Security Bulletin ID SB2023101289
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Medium 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Use of Potentially Dangerous Function (CVE-ID: CVE-2023-43115)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists in gdevijs.c in GhostPDL due to the way PostScript handles IJS device change. A remote attacker can trick the victim to open a specially crafted document that will switch to the IJS device, start the IJS server and execute arbitrary commands on the system.


2) Integer overflow (CVE-ID: CVE-2023-38560)

The vulnerability allows a remote attacker to crash the application.

The vulnerability exists due to integer overflow within the pl_glyph_name() function in pcl/pl/plfont.c when converting PCL files to PDF format. A remote attacker can pass a specially crafted PLC file to the application, trigger an integer overflow and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.