Sandbox Escape Flaw in Ghostscript by Artifex Systems
CVE-2021-3781
9.9CRITICAL
Summary
A flaw in the Ghostscript interpreter allows for a sandbox escape when the -dSAFER
option is enabled. By injecting a carefully crafted pipe command into a specially formatted document, an attacker can execute arbitrary commands on the underlying system. This poses significant risks to the confidentiality and integrity of the affected system, as well as potential impacts on system availability. Users should take immediate action to mitigate this vulnerability by updating to the latest versions or applying relevant security patches.
Affected Version(s)
ghostscript ghostpdl 9.55.0
References
EPSS Score
13% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved