Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-38559: Out-of-bounds Read in Red Hat Red Hat Enterprise Linux 8

0
Medium
VulnerabilityCVE-2023-38559cvecve-2023-38559
Published: Tue Aug 01 2023 (08/01/2023, 16:49:47 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 8

Description

A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.

AI-Powered Analysis

AILast updated: 11/20/2025, 19:04:22 UTC

Technical Analysis

CVE-2023-38559 is a vulnerability identified in Red Hat Enterprise Linux 8 affecting the Ghostscript component, specifically in the file base/gdevdevn.c at line 1973 within the devn_pcx_write_rle() function. The flaw is a buffer overflow that leads to an out-of-bounds read condition. Ghostscript is a widely used interpreter for PostScript and PDF files, and the DEVN device is one of its output devices. An attacker with local access can exploit this vulnerability by providing a specially crafted PDF file that triggers the buffer overflow when processed by Ghostscript, causing the application to crash and resulting in a denial of service. The CVSS 3.1 base score is 5.5 (medium), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The impact is limited to availability (A:H) with no confidentiality or integrity impact. There are no known exploits in the wild, and no patches were linked in the provided data, but Red Hat typically addresses such issues promptly. This vulnerability does not allow remote code execution or privilege escalation but can disrupt services relying on Ghostscript processing PDFs, which may affect automated workflows or printing services.

Potential Impact

For European organizations, the primary impact of CVE-2023-38559 is the potential for denial of service on systems running Red Hat Enterprise Linux 8 that utilize Ghostscript for PDF processing. This could disrupt business-critical operations such as document rendering, printing, or automated PDF workflows. While the vulnerability does not compromise data confidentiality or integrity, availability disruptions can lead to operational delays and increased support costs. Organizations in sectors relying heavily on Linux-based infrastructure, including government, finance, manufacturing, and telecommunications, may experience service interruptions if local users or processes trigger the flaw. Since exploitation requires local access and user interaction, insider threats or compromised user accounts pose the greatest risk. The absence of known exploits in the wild reduces immediate threat urgency but does not eliminate the risk of future exploitation. European entities with strict uptime and service availability requirements should consider this vulnerability a moderate operational risk.

Mitigation Recommendations

To mitigate CVE-2023-38559 effectively, European organizations should: 1) Monitor and restrict local user access to systems running Red Hat Enterprise Linux 8, especially those that process PDF files with Ghostscript. 2) Implement strict user privilege management to minimize the number of users who can execute Ghostscript or related PDF processing tasks. 3) Employ application whitelisting or execution control to prevent unauthorized or suspicious PDF files from being processed. 4) Monitor system logs and Ghostscript error reports for signs of crashes or abnormal behavior indicative of exploitation attempts. 5) Once Red Hat releases an official patch or update addressing this vulnerability, apply it promptly in all affected environments. 6) Consider isolating or sandboxing PDF processing workflows to limit the impact of potential DoS conditions. 7) Educate users about the risks of opening untrusted PDF files locally to reduce the chance of triggering the vulnerability. These steps go beyond generic advice by focusing on access control, monitoring, and operational controls tailored to the nature of this local, user-interaction-based vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-07-20T14:53:37.543Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e84aedba0e608b4fb043ae

Added to database: 10/9/2025, 11:53:17 PM

Last enriched: 11/20/2025, 7:04:22 PM

Last updated: 12/4/2025, 11:34:18 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats