CVE-2017-8291
ENISA EUVD: EUVD-2017-17253 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 5, 2026
1 article
Published: 2017-04-27
EPSS Score
Source: FIRST.org · 2026-05-23
92.88%
probability
This CVE has a 92.88% probability
of being exploited in the next 30 days.
0%
Top 99.8th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v2 (legacy)
6.8
MEDIUM
Access Vector
Network
Access Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
AV:N/AC:M/Au:N/C:P/I:P/A:P
Description
VulnerabilityLookup (CNA)Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
Affected Products
n/a
n/a
Attack Intelligence
Google Project Zero
Patched
April 27, 2017
Reported by
???
Root Cause Analysis
???
Exploits & PoC
0
2025-04-27
0
2025-04-27
hkcfs/PIL-CVE-2017-8291
CVE-2017-8291 CTF with docker and examples
0
2025-06-13
0
2025-12-03
4 repos — triés par ⭐
Rechercher sur GitHub ↗
http://www.debian.org/security/2017/dsa-3838
vendor-advisory
x_refsource_DEBIAN
https://bugzilla.suse.com/show_bug.cgi?id=1036453
x_refsource_MISC
https://access.redhat.com/errata/RHSA-2017:1230
vendor-advisory
x_refsource_REDHAT
http://www.securityfocus.com/bid/98476
vdb-entry
x_refsource_BID
https://www.exploit-db.com/exploits/41955/
exploit
x_refsource_EXPLOIT-DB
http://openwall.com/lists/oss-security/2017/04/28/2
x_refsource_MISC
Signal Intelligence
Confidence
95%
EPSS
92.88%
CVSS v3.1
7.8
Mentions
1
CNA Information
CNA Assigner
mitre
Analyst Note
Auto-imported from Google Project Zero — confirmed zero-day by definition.
Threat Actors 3
APT37
apt_group
Information theft and espionage
🇰🇵 KP
FusionCore
apt_group
🇪🇺 EU
DNSpionage
apt_group
Information theft and espionage
🇮🇷 IR
Triage Info
Decided atMar 05, 2026
Published DateApr 27, 2017