Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "9.10~dfsg-0ubuntu10.7",
"binary_name": "ghostscript"
},
{
"binary_version": "9.10~dfsg-0ubuntu10.7",
"binary_name": "ghostscript-x"
},
{
"binary_version": "9.10~dfsg-0ubuntu10.7",
"binary_name": "libgs-dev"
},
{
"binary_version": "9.10~dfsg-0ubuntu10.7",
"binary_name": "libgs9"
},
{
"binary_version": "9.10~dfsg-0ubuntu10.7",
"binary_name": "libgs9-common"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "9.18~dfsg~0-0ubuntu2.4",
"binary_name": "ghostscript"
},
{
"binary_version": "9.18~dfsg~0-0ubuntu2.4",
"binary_name": "ghostscript-x"
},
{
"binary_version": "9.18~dfsg~0-0ubuntu2.4",
"binary_name": "libgs-dev"
},
{
"binary_version": "9.18~dfsg~0-0ubuntu2.4",
"binary_name": "libgs9"
},
{
"binary_version": "9.18~dfsg~0-0ubuntu2.4",
"binary_name": "libgs9-common"
}
]
}