Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
References
| Link | Resource |
|---|---|
| https://bugs.ghostscript.com/show_bug.cgi?id=707662 | Issue Tracking |
| https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/ | Exploit Third Party Advisory |
| https://www.openwall.com/lists/oss-security/2024/07/03/7 | Mailing List |
| https://bugs.ghostscript.com/show_bug.cgi?id=707662 | Issue Tracking |
| https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/ | Exploit Third Party Advisory |
| https://www.openwall.com/lists/oss-security/2024/07/03/7 | Mailing List |
| https://www.vicarius.io/vsociety/posts/critical-vulnerability-in-ghostscript-cve-2024-29510 | Exploit Third Party Advisory |
Configurations
History
28 Apr 2025, 17:12
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:* | |
| References | () https://bugs.ghostscript.com/show_bug.cgi?id=707662 - Issue Tracking | |
| References | () https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/ - Exploit, Third Party Advisory | |
| References | () https://www.openwall.com/lists/oss-security/2024/07/03/7 - Mailing List | |
| References | () https://www.vicarius.io/vsociety/posts/critical-vulnerability-in-ghostscript-cve-2024-29510 - Exploit, Third Party Advisory | |
| First Time |
Artifex
Artifex ghostscript |
Information
Published : 2024-07-03 19:15
Updated : 2025-04-28 17:12
NVD link : CVE-2024-29510
Mitre link : CVE-2024-29510
CVE.ORG link : CVE-2024-29510
JSON object : View
Products Affected
artifex
- ghostscript
CWE
CWE-693
Protection Mechanism Failure
