Vulnerability Details : CVE-2023-43115
In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2023-43115
Probability of exploitation activity in the next 30 days: 0.25%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 62 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2023-43115
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
[email protected] |
References for CVE-2023-43115
-
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=e59216049cac290fb437a04c4f41ea46826cfba5
Mailing List;Patch
-
https://ghostscript.com/
Product
-
https://bugs.ghostscript.com/show_bug.cgi?id=707051
Permissions Required
Products affected by CVE-2023-43115
- cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*