Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
devel ghostscript 9.19~dfsg+1-0ubuntu8
precise ghostscript 9.05~dfsg-0ubuntu4.5
trusty ghostscript 9.10~dfsg-0ubuntu10.7
xenial ghostscript 9.18~dfsg~0-0ubuntu2.4
yakkety ghostscript 9.19~dfsg+1-0ubuntu6.4
zesty ghostscript 9.19~dfsg+1-0ubuntu7.2


Release Package Reason
precise/esm ghostscript DNE
vivid/stable-phone-overlay ghostscript DNE
vivid/ubuntu-core ghostscript DNE

Needs Triage

Release Package Reason
upstream ghostscript needs-triage