CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
6.5 | $0-$5k | 0.00 |
A vulnerability was found in Artifex Ghostscript up to 10.01.2 (Document Processing Software). It has been rated as critical. This issue affects an unknown part of the component Pipe Character Handler. The manipulation with an unknown input leads to a permission vulnerability. Using CWE to declare the problem leads to CWE-275. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).
The weakness was released 06/26/2023. The advisory is shared at bugs.ghostscript.com. The identification of this vulnerability is CVE-2023-36664 since 06/25/2023. Neither technical details nor an exploit are publicly available. MITRE ATT&CK project uses the attack technique T1222 for this issue.
Applying the patch 0974e4f2ac0005d3731e0b5c13ebc7e965540f4d is able to eliminate this problem. The bugfix is ready for download at git.ghostscript.com.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔒VulDB CVSS-BT Score: 🔒
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.6VulDB Meta Temp Score: 6.5
VulDB Base Score: 5.5
VulDB Temp Score: 5.3
VulDB Vector: 🔒
VulDB Reliability: 🔍
NVD Base Score: 7.8
NVD Vector: 🔒
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploiting
Class: PermissionCWE: CWE-275 / CWE-266
CAPEC: 🔒
ATT&CK: 🔒
Local: No
Remote: Partially
Availability: 🔒
Status: Not defined
EPSS Score: 🔒
EPSS Percentile: 🔒
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔒
Patch: 0974e4f2ac0005d3731e0b5c13ebc7e965540f4d
Timeline
06/25/2023 CVE reserved06/26/2023 Advisory disclosed
06/26/2023 VulDB entry created
07/18/2023 VulDB entry last update
Sources
Vendor: artifex.comAdvisory: FEDORA-2023-d8a1c3e5e2
Status: Confirmed
CVE: CVE-2023-36664 (🔒)
Entry
Created: 06/26/2023 06:49Updated: 07/18/2023 15:01
Changes: 06/26/2023 06:49 (42), 07/18/2023 15:00 (1), 07/18/2023 15:01 (11)
Complete: 🔍
Cache ID: 3:E05:103
No comments yet. Languages: en.
Please log in to comment.