{
  "threat_severity" : "Moderate",
  "public_date" : "2024-05-16T00:00:00Z",
  "bugzilla" : {
    "description" : "ghostscript: path traversal and command execution due to path reduction",
    "id" : "2293958",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2293958"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-23",
  "details" : [ "An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.", "A flaw was found in Ghostscript. In certain circumstances, path reduction in the \"gp_validate_path_len\" function may allow path traversal or possible command execution." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-09-03T00:00:00Z",
    "advisory" : "RHSA-2024:6197",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "ghostscript-0:9.54.0-17.el9_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Extended Update Support",
    "release_date" : "2024-09-09T00:00:00Z",
    "advisory" : "RHSA-2024:6466",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.2",
    "package" : "ghostscript-0:9.54.0-12.el9_2.2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "ghostscript",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "ghostscript",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "ghostscript",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Will not fix",
    "package_name" : "ghostscript",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Will not fix",
    "package_name" : "gimp:flatpak/ghostscript",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-33869\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-33869" ],
  "name" : "CVE-2024-33869",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}