Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
overview
A critical remote code execution vulnerability, tracked as CVE-2023-36664, has been discovered in Ghostscript, an open-source interpreter used for PostScript language and PDF files in Linux. The vulnerability affects all versions of Ghostscript prior to 10.01.2, the most recent release. It has been assigned a CVSS score of 9.8.
The Cyber Threat Intelligence team at Kroll has reported that CVE-2023-36664 enables code execution due to improper permission validation in Ghostscript when handling pipe devices, specifically those with the %pipe% or | pipe character prefix. This could result in the execution of arbitrary commands. the team developed a proof-of-concept for the vulnerability and discovered that code execution can be triggered when opening malicious, specially crafted files.
Considering its pre-installation in numerous Linux distributions and widespread usage by popular software such as LibreOffice, GIMP, Inkscape, Scribus, ImageMagick, and the CUPS printing system, there are ample opportunities to trigger CVE-2023-36664 in various scenarios. Also, the issue impacts open-source apps on Windows if the apps are a part of Ghostscript. It is highly recommended that users update systems to the most recent version of Ghostscript.
INDICATORS OF COMPROMISE (IoCs)
At this time, there are no known IoCs associated with CVE-2023-36664. Avertium’s threat hunters remain vigilant in locating IoCs for our customers. Should any be located, Avertium will disclose them as soon as possible. For more information on how Avertium can help protect your organization, please reach out to your Avertium Service Delivery Manager or Account Executive.
To detect CVE-2023-36664, see Kroll’s Sigma rules in Github.
SUPPORTING DOCUMENTATION