overview
A critical remote code execution vulnerability, tracked as CVE-2023-36664, has been discovered in Ghostscript, an open-source interpreter used for PostScript language and PDF files in Linux. The vulnerability affects all versions of Ghostscript prior to 10.01.2, the most recent release. It has been assigned a CVSS score of 9.8.
The Cyber Threat Intelligence team at Kroll has reported that CVE-2023-36664 enables code execution due to improper permission validation in Ghostscript when handling pipe devices, specifically those with the %pipe% or | pipe character prefix. This could result in the execution of arbitrary commands. the team developed a proof-of-concept for the vulnerability and discovered that code execution can be triggered when opening malicious, specially crafted files.
Considering its pre-installation in numerous Linux distributions and widespread usage by popular software such as LibreOffice, GIMP, Inkscape, Scribus, ImageMagick, and the CUPS printing system, there are ample opportunities to trigger CVE-2023-36664 in various scenarios. Also, the issue impacts open-source apps on Windows if the apps are a part of Ghostscript. It is highly recommended that users update systems to the most recent version of Ghostscript.
INDICATORS OF COMPROMISE (IoCs)
At this time, there are no known IoCs associated with CVE-2023-36664. Avertium’s threat hunters remain vigilant in locating IoCs for our customers. Should any be located, Avertium will disclose them as soon as possible. For more information on how Avertium can help protect your organization, please reach out to your Avertium Service Delivery Manager or Account Executive.
To detect CVE-2023-36664, see Kroll’s Sigma rules in Github.
SUPPORTING DOCUMENTATION