CVE-2017-8291 ghostscript


Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
buster ghostscript 9.20~dfsg-3.1
jessie ghostscript 9.06~dfsg-2+deb8u5
sid ghostscript 9.20~dfsg-3.1
stretch ghostscript 9.20~dfsg-3.1
wheezy ghostscript 9.05~dfsg-6.3+deb7u6