Stack-Based Buffer Overflow in Ghostscript Prior to 10.03.0
CVE-2024-29506
8.8HIGH
Summary
A stack-based buffer overflow vulnerability in Artifex Ghostscript arises from improper handling of long PDF filter names in the pdfi_apply_filter() function. This flaw permits potential attackers to exploit the overflow, leading to unpredictable behavior of the application, including possible execution of arbitrary code. Users of Ghostscript versions prior to 10.03.0 are encouraged to upgrade to the latest version to mitigate associated risks.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published