CVE-2016-7977
ghostscript: .libfile does not honor -dSAFER
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document.
Ghostscript anterior a la versión 9.21 podría permitir que los atacantes remotos eludieran el mecanismo de protección del modo SAFER y, en consecuencia, leyeran archivos arbitrarios mediante el uso del operador .libfile en un documento Postscript manipulado.
It was found that ghostscript function .libfile did not honor the -dSAFER option, usually used when processing untrusted documents, leading to information disclosure. A specially crafted postscript document could, in the context of the gs process, retrieve file content on the target machine.
The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix: It was found that the ghostscript functions getenv, filenameforall and .libfile did not honor the -dSAFER option, usually used when processing untrusted documents, leading to information disclosure. A specially crafted postscript document could read environment variable, list directory and retrieve file content respectively, from the target.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-09-09 CVE Reserved
- 2016-12-02 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-31 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=8abd22010eb4db0fb1b10e430d5f5d83e015ef70 | X_refsource_confirm | |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html | X_refsource_confirm |
|
http://www.securityfocus.com/bid/95334 | Third Party Advisory | |
https://ghostscript.com/doc/9.21/History9.htm | Release Notes |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/09/29/28 | 2023-11-07 | |
http://www.openwall.com/lists/oss-security/2016/10/05/15 | 2023-11-07 | |
https://bugs.ghostscript.com/show_bug.cgi?id=697169 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2017-0013.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2017-0014.html | 2023-11-07 | |
http://www.debian.org/security/2016/dsa-3691 | 2023-11-07 | |
https://security.gentoo.org/glsa/201702-31 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2016-7977 | 2017-01-04 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1380415 | 2017-01-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Artifex Search vendor "Artifex" | Ghostscript Search vendor "Artifex" for product "Ghostscript" | <= 9.20 Search vendor "Artifex" for product "Ghostscript" and version " <= 9.20" | - |
Affected
|