Google Project Zero's safety researcher has discovered a critical remote code execution (RCE) vulnerability inward Ghostscript—an opened upwards source interpreter for Adobe Systems' PostScript together with PDF page description languages.
Written alone inward C, Ghostscript is a packet of software that runs on dissimilar platforms, including Windows, macOS, together with a broad multifariousness of Unix systems, offering software the might to convert PostScript linguistic communication files (or EPS) to many raster formats, such every bit PDF, XPS, PCL or PXL.
H5N1 lot of pop PDF together with icon editing software, including ImageMagick together with GIMP, operate Ghostscript library to parse the content together with convert file formats.
Ghostscript suite includes a built-in -dSAFER sandbox protection selection that handles untrusted documents, preventing dangerous or malicious PostScript operations from beingness executed.
However, Google Project Zero squad researcher Tavis Ormandy discovered that Ghostscript contains multiple -dSAFER sandbox bypass vulnerabilities, which could allow a remote, unauthenticated assaulter to execute arbitrary commands on a vulnerable system.
To exploit this vulnerability, all an assaulter needs to produce is sending a peculiarly crafted malicious file (which could last a PDF, PS, EPS, or XPS) to a victim, which, if opened amongst an application leveraging vulnerable Ghostscript, could allow the assaulter to completely accept over the targeted system.
At the fourth dimension of writing, Artifex Software, the maintainers of Ghostscript, create got non released whatever land to gear upwards the vulnerability.
According to advisory released past times US-CERT, applications similar the ImageMagick icon processing library, which uses Ghostscript past times default to procedure PostScript content, are affected past times the vulnerability.
Major Linux distributions including RedHat together with Ubuntu create got confirmed that they are every bit good affected past times this vulnerability, spell the condition for Arch Linux, CentOS, Debian, Dell, Apple, together with others is nevertheless unknown.
Ormandy advised Linux distributions to disable the processing of PS, EPS, PDF, together with XPS content until the number is addressed.
Written alone inward C, Ghostscript is a packet of software that runs on dissimilar platforms, including Windows, macOS, together with a broad multifariousness of Unix systems, offering software the might to convert PostScript linguistic communication files (or EPS) to many raster formats, such every bit PDF, XPS, PCL or PXL.
H5N1 lot of pop PDF together with icon editing software, including ImageMagick together with GIMP, operate Ghostscript library to parse the content together with convert file formats.
Ghostscript suite includes a built-in -dSAFER sandbox protection selection that handles untrusted documents, preventing dangerous or malicious PostScript operations from beingness executed.
However, Google Project Zero squad researcher Tavis Ormandy discovered that Ghostscript contains multiple -dSAFER sandbox bypass vulnerabilities, which could allow a remote, unauthenticated assaulter to execute arbitrary commands on a vulnerable system.
To exploit this vulnerability, all an assaulter needs to produce is sending a peculiarly crafted malicious file (which could last a PDF, PS, EPS, or XPS) to a victim, which, if opened amongst an application leveraging vulnerable Ghostscript, could allow the assaulter to completely accept over the targeted system.
At the fourth dimension of writing, Artifex Software, the maintainers of Ghostscript, create got non released whatever land to gear upwards the vulnerability.
According to advisory released past times US-CERT, applications similar the ImageMagick icon processing library, which uses Ghostscript past times default to procedure PostScript content, are affected past times the vulnerability.
Major Linux distributions including RedHat together with Ubuntu create got confirmed that they are every bit good affected past times this vulnerability, spell the condition for Arch Linux, CentOS, Debian, Dell, Apple, together with others is nevertheless unknown.
Ormandy advised Linux distributions to disable the processing of PS, EPS, PDF, together with XPS content until the number is addressed.
"I *strongly* propose that distributions start disabling PS, EPS, PDF together with XPS coders inward policy.xml past times default," Ormandy said.This is non the get-go fourth dimension when Ormandy has discovered issues inward Ghostscript. He institute similar high severity vulnerabilities inward Ghostscript inward October 2016 together with Apr terminal yr (CVE-2017-8291), about of which were institute actively exploited inward the wild.