First published: Sun Nov 10 2024(Updated: )
An issue was discovered in base/gsdevice.c in Artifex Ghostscript before 10.04.0. An integer overflow when parsing the filename format string (for the output filename) results in path truncation, and possible path traversal and code execution.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ghostscript | <=9.53.3~dfsg-7+deb11u7 | 9.53.3~dfsg-7+deb11u9 10.0.0~dfsg-11+deb12u6 10.05.0~dfsg-1 |
Ghostscript | <10.04.0 | |
Debian Linux | =12.0 | |
SUSE Linux Enterprise High Performance Computing | =12.0-sp5 | |
SUSE Linux Enterprise Server | =12-sp5 | |
SUSE Linux Enterprise Server | =12-sp5 | |
SUSE Linux Enterprise Server | =12-sp5 | |
SUSE Linux Enterprise Server | =12-sp5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46953 is a high severity vulnerability due to its potential for path traversal and code execution.
To fix CVE-2024-46953, update to a patched version of Ghostscript such as 10.04.0 or later.
CVE-2024-46953 affects all Ghostscript versions prior to 10.04.0.
CVE-2024-46953 is caused by an integer overflow when parsing the output filename format string leading to path truncation.
Yes, CVE-2024-46953 can potentially allow for remote code execution due to its path traversal capabilities.