Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-3781


A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.


Published

2022-02-16T19:15:08.817

Last Modified

2024-11-21T06:22:24.880

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.9 (CRITICAL)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.6

Impact Score

10.0

Weaknesses
  • Type: Secondary
    CWE-20
  • Type: Primary
    CWE-78

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application artifex ghostscript 9.50 Yes
Application artifex ghostscript 9.52 Yes
Application artifex ghostscript 9.53.3 Yes
Application artifex ghostscript 9.54.0 Yes
Operating System fedoraproject fedora 34 Yes

References