Summary: | Buffer Overflow in s_xBCPE_process | ||
---|---|---|---|
Product: | Ghostscript | Reporter: | hperri |
Component: | Security (public) | Assignee: | Chris Liddell (chrisl) <chris.liddell> |
Status: | RESOLVED FIXED | ||
Severity: | critical | CC: | akhaitov, carnil, cbuissar, dr, henry.stiles, jsmeix, ken.sharp, marc.deslauriers, mosaab.khallout, rlescak, sam, till.kamppeter |
Priority: | P1 | ||
Version: | unspecified | ||
Hardware: | PC | ||
OS: | Linux | ||
Customer: | Word Size: | --- | |
Attachments: | This zip archive includes three POC for GhostScript version 9.55.0 pulled from the package manager on ubuntu, GhostScript 10.0.0 and 10.01.0, compiled from source on Debian |
Description
hperri
2023-03-23 08:15:25 UTC
Firstly apologies for the slow response, we were literally pushing the 10.01.0 release out the door on Wednesday which involves some administrivia so our attention was temporarily diverted. I've made two commits to address this and potential related issues. The first is 37ed5022cecd584de868933b5b60da2e995b3179 which prevents the overrun. Secondly, in the same vein as we've done in the past with PostScript operators, commit 3635f4c75e54e337a4eebcf6db3eef0e60f9cebf removes a load of non-standard filters. Some of these were used by the old PDF interpreter, a number seem to have been included just for symmetry with a companion Encode/Decode filter, and a few I have no clue why they are there; they are not used. Removing these reduces the attack surface so we should do that. I have not closed the bug! I believe this warrants an out of band release (given the proof of concept), sadly only days after the main release but that's life. I'd like to leave this open and therefore not publicly disclosed, even though technically there is a patch available, until we have a chance to make a release generally available. That won't, unfortunately, be before the weekend. I'll leave the bug assigned to Chris to close when we have a patch release up. Hi, Thanks for the quick response, I can confirm that removing filters and reducing the attack surface in general is a really good idea. From an administrative point of view (I'm sorry to bother you with this), could this bug be eligible for your bug bounty program, or is this inquiries addressed in a completely different channel ? Thanks, Hadrien We have been assigned CVE-2023-28879 for this issue. (In reply to hperri from comment #2) > Hi, > > Thanks for the quick response, I can confirm that removing filters and > reducing the attack surface in general is a really good idea. > > From an administrative point of view (I'm sorry to bother you with this), > could this bug be eligible for your bug bounty program, or is this inquiries > addressed in a completely different channel ? > > Thanks, > Hadrien Hello Hadrien, please write me at the email address associated with my Bugzilla user name about the bounty. For the attention of the distribution package maintainers CC'ed here: Please roll out this patch to your Ghostscript pagage(s) ASAP, this is relevant to any version of Ghostscript: https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=37ed5022cecd We plan to make this bug public in approximately 7 days. Hello, Do you know how i can do this for PC (Windows 10) I don't know how to fix it (In reply to Mosaab from comment #6) > Hello, > > Do you know how i can do this for PC (Windows 10) > > I don't know how to fix it https://artifex.com/news/critical-security-vulnerability-fixed-in-ghostscript |