Sandbox Escape Flaw in Ghostscript by Artifex Systems
CVE-2021-3781

9.9CRITICAL

Key Information:

Vendor
Artifex
Vendor
CVE Published:
16 February 2022

Summary

A flaw in the Ghostscript interpreter allows for a sandbox escape when the -dSAFER option is enabled. By injecting a carefully crafted pipe command into a specially formatted document, an attacker can execute arbitrary commands on the underlying system. This poses significant risks to the confidentiality and integrity of the affected system, as well as potential impacts on system availability. Users should take immediate action to mitigate this vulnerability by updating to the latest versions or applying relevant security patches.

Affected Version(s)

ghostscript ghostpdl 9.55.0

References

EPSS Score

13% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.