First published: Wed Jul 03 2024(Updated: )
Artifex Ghostscript before 10.03.0 sometimes has a stack-based buffer overflow via the CIDFSubstPath and CIDFSubstFont parameters.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ghostscript | <=10.0.0~dfsg-11+deb12u4 | 9.53.3~dfsg-7+deb11u7 10.0.0~dfsg-11+deb12u5 10.03.1~dfsg-2 |
Ghostscript | <10.03.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29507 is classified as a high severity vulnerability due to its potential for exploitation through a stack-based buffer overflow.
To mitigate CVE-2024-29507, update to Ghostscript version 10.03.1~dfsg-2 or higher.
CVE-2024-29507 affects Ghostscript versions prior to 10.03.0, including specific older versions listed in the Debian package details.
Exploitation of CVE-2024-29507 may result in arbitrary code execution, potentially compromising system integrity.
CVE-2024-29507 primarily affects Debian-based systems using vulnerable versions of the Ghostscript package.