A remote, unauthenticated attacker could execute arbitrary commands on systems with the privileges of the Ghostscript code.
Source: Threadpost