CVE-2017-8291

ENISA EUVD: EUVD-2017-17253 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 5, 2026 1 article Published: 2017-04-27

EPSS Score

Source: FIRST.org · 2026-05-23
92.88%
probability
This CVE has a 92.88% probability of being exploited in the next 30 days.
0% Top 99.8th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS v2 (legacy)

6.8
MEDIUM
Access Vector
Network
Access Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

VulnerabilityLookup (CNA)
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.

Affected Products

n/a
n/a

Attack Intelligence

Google Project Zero

Patched
April 27, 2017
Reported by
???
Root Cause Analysis
???

Exploits & PoC

hkcfs/PIL-CVE-2017-8291

CVE-2017-8291 CTF with docker and examples

0 2025-06-13
4 repos — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
95%
EPSS 92.88%
CVSS v3.1 7.8
Mentions 1

CNA Information

CNA Assigner
mitre

Analyst Note

Auto-imported from Google Project Zero — confirmed zero-day by definition.

Threat Actors 3

APT37
apt_group Information theft and espionage 🇰🇵 KP
FusionCore
apt_group 🇪🇺 EU
DNSpionage
apt_group Information theft and espionage 🇮🇷 IR

Triage Info

Decided atMar 05, 2026
Published DateApr 27, 2017