This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote Windows host contains a library that is affected by a
remote command execution vulnerability.
The version of Artifex Ghostscript installed on the remote Windows
host is 9.21 or earlier. It is, therefore, affected by a type
confusion error when handling the '.rsdparams' operator with a
'/OutputFile (%pipe%' substring. An unauthenticated, remote attacker
can exploit this, via a specially crafted EPS file, to bypass the
-dSAFER sandbox and execute arbitrary commands.
See also :
Refer to bug 697799 for possible workarounds or patches. A fixed
version of Ghostscript reportedly is scheduled for release in
September of 2017.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.6
Public Exploit Available : true