CVE-2024-33869

Name
CVE-2024-33869
Description
An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Issue Tracking https://bugs.ghostscript.com/show_bug.cgi?id=707691
Mailing List https://www.openwall.com/lists/oss-security/2024/06/28/2

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:* ghostscript >= None < 10.03.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
ghostscript edge-main 10.03.1-r0 Cameron Banta <cbanta@gmail.com> fixed
ghostscript edge-main 10.02.0-r0 Cameron Banta <cbanta@gmail.com> possibly vulnerable
ghostscript edge-main 9.54-r1 None possibly vulnerable
ghostscript edge-main 9.51-r0 None possibly vulnerable
ghostscript edge-main 9.50-r0 None possibly vulnerable
ghostscript edge-main 9.27-r4 None possibly vulnerable
ghostscript edge-main 9.27-r3 None possibly vulnerable
ghostscript edge-main 9.27-r2 None possibly vulnerable
ghostscript edge-main 9.26-r2 None possibly vulnerable
ghostscript edge-main 9.26-r1 None possibly vulnerable
ghostscript edge-main 9.26-r0 None possibly vulnerable
ghostscript edge-main 9.25-r1 None possibly vulnerable
ghostscript edge-main 9.25-r0 None possibly vulnerable
ghostscript edge-main 9.24-r0 None possibly vulnerable
ghostscript edge-main 9.23-r0 None possibly vulnerable
ghostscript edge-main 9.21-r3 None possibly vulnerable
ghostscript edge-main 9.21-r2 None possibly vulnerable
ghostscript 3.22-main 10.03.1-r0 None fixed
ghostscript 3.22-main 10.02.0-r0 None possibly vulnerable
ghostscript 3.22-main 9.54-r1 None possibly vulnerable
ghostscript 3.22-main 9.51-r0 None possibly vulnerable
ghostscript 3.22-main 9.50-r0 None possibly vulnerable
ghostscript 3.22-main 9.27-r4 None possibly vulnerable
ghostscript 3.22-main 9.27-r3 None possibly vulnerable
ghostscript 3.22-main 9.27-r2 None possibly vulnerable
ghostscript 3.22-main 9.26-r2 None possibly vulnerable
ghostscript 3.22-main 9.26-r1 None possibly vulnerable
ghostscript 3.22-main 9.26-r0 None possibly vulnerable
ghostscript 3.22-main 9.25-r1 None possibly vulnerable
ghostscript 3.22-main 9.25-r0 None possibly vulnerable
ghostscript 3.22-main 9.24-r0 None possibly vulnerable
ghostscript 3.22-main 9.23-r0 None possibly vulnerable
ghostscript 3.22-main 9.21-r3 None possibly vulnerable
ghostscript 3.22-main 9.21-r2 None possibly vulnerable
ghostscript 3.21-main 10.03.1-r0 None fixed
ghostscript 3.21-main 10.02.0-r0 None possibly vulnerable
ghostscript 3.21-main 9.54-r1 None possibly vulnerable
ghostscript 3.21-main 9.51-r0 None possibly vulnerable
ghostscript 3.21-main 9.50-r0 None possibly vulnerable
ghostscript 3.21-main 9.27-r4 None possibly vulnerable
ghostscript 3.21-main 9.27-r3 None possibly vulnerable
ghostscript 3.21-main 9.27-r2 None possibly vulnerable
ghostscript 3.21-main 9.26-r2 None possibly vulnerable
ghostscript 3.21-main 9.26-r1 None possibly vulnerable
ghostscript 3.21-main 9.26-r0 None possibly vulnerable
ghostscript 3.21-main 9.25-r1 None possibly vulnerable
ghostscript 3.21-main 9.25-r0 None possibly vulnerable
ghostscript 3.21-main 9.24-r0 None possibly vulnerable
ghostscript 3.21-main 9.23-r0 None possibly vulnerable
ghostscript 3.21-main 9.21-r3 None possibly vulnerable
ghostscript 3.21-main 9.21-r2 None possibly vulnerable
ghostscript 3.20-main 10.03.1-r0 Cameron Banta <cbanta@gmail.com> fixed
ghostscript 3.20-main 10.02.0-r0 None possibly vulnerable
ghostscript 3.20-main 9.54-r1 None possibly vulnerable
ghostscript 3.20-main 9.51-r0 None possibly vulnerable
ghostscript 3.20-main 9.50-r0 None possibly vulnerable
ghostscript 3.20-main 9.27-r4 None possibly vulnerable
ghostscript 3.20-main 9.27-r3 None possibly vulnerable
ghostscript 3.20-main 9.27-r2 None possibly vulnerable
ghostscript 3.20-main 9.26-r2 None possibly vulnerable
ghostscript 3.20-main 9.26-r1 None possibly vulnerable
ghostscript 3.20-main 9.26-r0 None possibly vulnerable
ghostscript 3.20-main 9.25-r1 None possibly vulnerable
ghostscript 3.20-main 9.25-r0 None possibly vulnerable
ghostscript 3.20-main 9.24-r0 None possibly vulnerable
ghostscript 3.20-main 9.23-r0 None possibly vulnerable
ghostscript 3.20-main 9.21-r3 None possibly vulnerable
ghostscript 3.20-main 9.21-r2 None possibly vulnerable
ghostscript 3.19-main 10.03.1-r0 Cameron Banta <cbanta@gmail.com> fixed
ghostscript 3.19-main 10.02.0-r0 None possibly vulnerable
ghostscript 3.19-main 9.54-r1 None possibly vulnerable
ghostscript 3.19-main 9.51-r0 None possibly vulnerable
ghostscript 3.19-main 9.50-r0 None possibly vulnerable
ghostscript 3.19-main 9.27-r4 None possibly vulnerable
ghostscript 3.19-main 9.27-r3 None possibly vulnerable
ghostscript 3.19-main 9.27-r2 None possibly vulnerable
ghostscript 3.19-main 9.26-r2 None possibly vulnerable
ghostscript 3.19-main 9.26-r1 None possibly vulnerable
ghostscript 3.19-main 9.26-r0 None possibly vulnerable
ghostscript 3.19-main 9.25-r1 None possibly vulnerable
ghostscript 3.19-main 9.25-r0 None possibly vulnerable
ghostscript 3.19-main 9.24-r0 None possibly vulnerable
ghostscript 3.19-main 9.23-r0 None possibly vulnerable
ghostscript 3.19-main 9.21-r3 None possibly vulnerable
ghostscript 3.19-main 9.21-r2 None possibly vulnerable
ghostscript 3.18-main 10.04.0-r0 Cameron Banta <cbanta@gmail.com> fixed