Integer Overflow in Ghostscript Could Lead to Path Truncation and Code Execution
CVE-2024-46953

7.8HIGH

Key Information:

Vendor
Artifex
Vendor
CVE Published:
10 November 2024

Summary

An integer overflow vulnerability has been identified in the Ghostscript image processing tool, specifically in the base/gsdevice.c file, prior to version 10.04.0. This flaw occurs during the parsing of the filename format string used for output file names, leading to potential truncation of file paths. As a consequence, attackers may exploit this vulnerability to execute arbitrary code or perform unauthorized path traversal operations. It is crucial for users and administrators of affected versions to implement timely updates and patches to mitigate potential risks associated with this vulnerability.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.