Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initialize_dsc_parser.
The product does not correctly convert an object, resource, or structure from one type to a different type.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ghostscript | Artifex | * | 9.20 (including) |
Red Hat Enterprise Linux 6 | RedHat | ghostscript-0:8.70-21.el6_8.1 | * |
Red Hat Enterprise Linux 7 | RedHat | ghostscript-0:9.07-20.el7_3.1 | * |
Ghostscript | Ubuntu | devel | * |
Ghostscript | Ubuntu | precise | * |
Ghostscript | Ubuntu | trusty | * |
Ghostscript | Ubuntu | xenial | * |
Ghostscript | Ubuntu | yakkety | * |