CVE-2023-36664
Ghostscript vulnerability analysis and mitigation

Overview

Artifex Ghostscript through version 10.01.2 contains a security vulnerability identified as CVE-2023-36664. The vulnerability stems from mishandled permission validation for pipe devices, specifically when handling the %pipe% prefix or the | pipe character prefix. This vulnerability affects the GPL PostScript/PDF interpreter, which is widely used in various Linux distributions and systems (NVD, Debian Advisory).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High), with the following vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This indicates that while the attack requires local access and user interaction, it requires no privileges and can result in high impacts across confidentiality, integrity, and availability. The vulnerability is tracked as CWE-552, relating to Files or Directories Accessible to External Parties (NVD).

Impact

The vulnerability could result in the execution of arbitrary commands if malformed document files are processed, potentially leading to complete system compromise with high impacts on confidentiality, integrity, and availability (Debian Advisory).

Mitigation and workarounds

Multiple vendors have released patches to address this vulnerability. Debian has fixed the issue in version 9.53.3~dfsg-7+deb11u5 for oldstable (bullseye) and version 10.0.0~dfsg-11+deb12u1 for stable (bookworm). Fedora has released updates for version 9.56.1-8.fc37 and 10.01.2-1.fc38. Gentoo users should upgrade to version 10.01.2 or later (Debian Advisory, Fedora Update, Gentoo Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management