Stack-Based Buffer Overflow in Ghostscript Prior to 10.03.0
CVE-2024-29506

8.8HIGH

Key Information:

Vendor
Artifex
Vendor
CVE Published:
3 July 2024

Summary

A stack-based buffer overflow vulnerability in Artifex Ghostscript arises from improper handling of long PDF filter names in the pdfi_apply_filter() function. This flaw permits potential attackers to exploit the overflow, leading to unpredictable behavior of the application, including possible execution of arbitrary code. Users of Ghostscript versions prior to 10.03.0 are encouraged to upgrade to the latest version to mitigate associated risks.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

.