CVE-2024-29511

high

Description

Artifex Ghostscript before 10.03.1, when Tesseract is used for OCR, has a directory traversal issue that allows arbitrary file reading (and writing of error messages to arbitrary files) via OCRLanguage. For example, exploitation can use debug_file /tmp/out and user_patterns_file /etc/passwd.

References

https://www.securityweek.com/attackers-exploiting-remote-code-execution-vulnerability-in-ghostscript/

https://securityaffairs.com/165449/hacking/ghostscript-vulnerability-cve-2024-29510.html?web_view=true

https://www.openwall.com/lists/oss-security/2024/07/03/7

https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=3d4cfdc1a44

https://bugs.ghostscript.com/show_bug.cgi?id=707510

Details

Source: Mitre, NVD

Published: 2024-07-03

Updated: 2024-07-08

Risk Information

CVSS v2

Base Score: 3.2

Vector: CVSS2#AV:L/AC:L/Au:S/C:P/I:P/A:N

Severity: Low

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Severity: High