Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-38559: Out-of-bounds Read in Red Hat Red Hat Enterprise Linux 8

0
Medium
VulnerabilityCVE-2023-38559cvecve-2023-38559
Published: Tue Aug 01 2023 (08/01/2023, 16:49:47 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 8

Description

A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.

AI-Powered Analysis

AILast updated: 10/10/2025, 00:09:30 UTC

Technical Analysis

CVE-2023-38559 is a buffer overflow vulnerability identified in the Ghostscript component of Red Hat Enterprise Linux 8, specifically within the devn_pcx_write_rle() function located in base/gdevdevn.c at line 1973. Ghostscript is a widely used interpreter for PostScript and PDF files, and the vulnerable function handles RLE (Run-Length Encoding) writes for the DEVN device. The flaw arises from an out-of-bounds read caused by improper bounds checking when processing crafted PDF files that exploit the DEVN device's handling routines. An attacker with local access can trigger this vulnerability by supplying a malicious PDF file, which leads to a denial of service (DoS) condition by crashing the Ghostscript process. The vulnerability does not allow for privilege escalation, code execution, or data leakage, as it solely impacts availability. The CVSS 3.1 base score is 5.5 (medium severity), reflecting the local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope remains unchanged (S:U), and the impact is limited to availability (A:H) without affecting confidentiality or integrity. No public exploits or active exploitation have been reported to date. The vulnerability was published on August 1, 2023, and is assigned by Red Hat. While no patch links are provided in the source data, it is expected that Red Hat will release updates to address this issue. Organizations using RHEL 8 with Ghostscript should monitor for patches and apply them promptly to mitigate potential denial of service risks.

Potential Impact

For European organizations, the primary impact of CVE-2023-38559 is the potential for denial of service on systems running Red Hat Enterprise Linux 8 with Ghostscript. This could disrupt services that rely on PDF processing or printing workflows involving the DEVN device, potentially affecting document handling, automated reporting, or print services. While the vulnerability does not compromise confidentiality or integrity, availability disruptions can lead to operational downtime, impacting business continuity and productivity. Critical infrastructure sectors such as finance, healthcare, government, and manufacturing that utilize RHEL 8 may face service interruptions if exploited. The requirement for local access and user interaction limits the attack surface, reducing the likelihood of remote exploitation. However, insider threats or compromised user accounts could leverage this vulnerability to cause targeted denial of service. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for proactive mitigation. European organizations should assess their exposure based on the presence of vulnerable Ghostscript versions and the role of affected systems in their operational environment.

Mitigation Recommendations

To mitigate CVE-2023-38559, European organizations should implement the following specific measures: 1) Monitor Red Hat security advisories and promptly apply official patches or updates for Ghostscript and Red Hat Enterprise Linux 8 as they become available. 2) Restrict local user access to systems running Ghostscript, especially limiting the ability to process untrusted PDF files or use DEVN device features. 3) Implement application whitelisting or sandboxing for PDF processing tools to contain potential crashes and prevent system-wide impact. 4) Employ strict user privilege management to minimize the number of users who can execute Ghostscript or related PDF processing commands. 5) Conduct regular audits of PDF processing workflows to identify and isolate untrusted input sources. 6) Use intrusion detection systems to monitor for unusual local activity involving Ghostscript or PDF file handling. 7) Educate users about the risks of opening untrusted PDF files locally, emphasizing the need for caution and reporting anomalies. 8) Consider disabling or limiting DEVN device support in Ghostscript if it is not required for business operations. These targeted actions go beyond generic advice by focusing on controlling local access, managing input trust boundaries, and preparing for rapid patch deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-07-20T14:53:37.543Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e84aedba0e608b4fb043ae

Added to database: 10/9/2025, 11:53:17 PM

Last enriched: 10/10/2025, 12:09:30 AM

Last updated: 10/15/2025, 7:15:33 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats