9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.004 Low
EPSS
Percentile
72.9%
In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading
to potential corruption of data internal to the PostScript interpreter, in
base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode.
If the write buffer is filled to one byte less than full, and one then
tries to write an escaped character, two bytes are written.
Author | Note |
---|---|
sbeattie | additional hardening upstream in commit 3635f4c75e (“PostScript filters - remove non-standard filters when SAFER is true”) consider applying as part of security fix |
rodrigo-zaiden | hardening commit, 3635f4c75e, removes filters that are required for the old PDF interpreter written in PostScript. the new PDF interpreter written in C, is enabled by default in ghostscript 9.56.1. so, the hardening can break certain operations in older versions. in Ubuntu, the hardening is not applied is releases older than kinetic. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | ghostscript | < 9.26~dfsg+0-0ubuntu0.18.04.18 | UNKNOWN |
ubuntu | 20.04 | noarch | ghostscript | < 9.50~dfsg-5ubuntu4.7 | UNKNOWN |
ubuntu | 22.04 | noarch | ghostscript | < 9.55.0~dfsg1-0ubuntu5.2 | UNKNOWN |
ubuntu | 22.10 | noarch | ghostscript | < 9.56.1~dfsg1-0ubuntu3.1 | UNKNOWN |
ubuntu | 23.04 | noarch | ghostscript | < 10.0.0~dfsg1-0ubuntu1.1 | UNKNOWN |
ubuntu | 16.04 | noarch | ghostscript | < 9.26~dfsg+0-0ubuntu0.16.04.14+esm5 | UNKNOWN |
artifex.com/news/critical-security-vulnerability-fixed-in-ghostscript
ghostscript.com/blog/pdfi.html
ghostscript.readthedocs.io/en/latest/News.html
launchpad.net/bugs/cve/CVE-2023-28879
nvd.nist.gov/vuln/detail/CVE-2023-28879
offsec.almond.consulting/ghostscript-cve-2023-28879.html
security-tracker.debian.org/tracker/CVE-2023-28879
ubuntu.com/security/notices/USN-6017-1
ubuntu.com/security/notices/USN-6017-2
www.cve.org/CVERecord?id=CVE-2023-28879
www.openwall.com/lists/oss-security/2023/04/12/4