Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-38560: Integer Overflow or Wraparound in Red Hat Red Hat Enterprise Linux 6

0
Medium
VulnerabilityCVE-2023-38560cvecve-2023-38560
Published: Tue Aug 01 2023 (08/01/2023, 16:49:48 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 6

Description

An integer overflow flaw was found in pcl/pl/plfont.c:418 in pl_glyph_name in ghostscript. This issue may allow a local attacker to cause a denial of service via transforming a crafted PCL file to PDF format.

AI-Powered Analysis

AILast updated: 11/20/2025, 19:04:37 UTC

Technical Analysis

CVE-2023-38560 is an integer overflow vulnerability identified in the Ghostscript software component included in Red Hat Enterprise Linux 6. The flaw exists in the pcl/pl/plfont.c source file, specifically at line 418 within the pl_glyph_name function. This function processes PCL (Printer Command Language) files during their transformation into PDF format. The integer overflow or wraparound can occur when handling crafted PCL files, leading to improper memory handling. This vulnerability can be exploited by a local attacker who has the ability to submit a maliciously crafted PCL file for conversion. Exploitation results in a denial of service (DoS) condition by crashing the Ghostscript process, thereby disrupting printing or document conversion services. The vulnerability does not allow for privilege escalation, data leakage, or code execution, but it impacts availability. The CVSS 3.1 vector (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) indicates that the attack requires local access and user interaction but has low complexity and no privileges required. No public exploits or active exploitation have been reported to date. The vulnerability affects legacy Red Hat Enterprise Linux 6 systems, which may still be in use in some environments due to long-term support or legacy application dependencies.

Potential Impact

For European organizations, the primary impact of CVE-2023-38560 is the potential disruption of printing and document conversion workflows that rely on Ghostscript within Red Hat Enterprise Linux 6 environments. This can lead to denial of service conditions affecting operational continuity, especially in sectors such as government, finance, healthcare, and manufacturing where document processing is critical. Although the vulnerability does not compromise confidentiality or integrity, the availability impact can cause delays, reduce productivity, and potentially interrupt business-critical processes. Organizations using legacy systems or those that have not migrated from Red Hat Enterprise Linux 6 are particularly vulnerable. The requirement for local access and user interaction limits remote exploitation but insider threats or compromised endpoints could leverage this flaw. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits in the future.

Mitigation Recommendations

To mitigate CVE-2023-38560, organizations should prioritize applying any available patches or updates from Red Hat that address this vulnerability in Ghostscript. If patches are not immediately available, consider disabling or restricting the use of PCL to PDF conversion functionalities in Ghostscript where feasible. Limit local access to systems running Red Hat Enterprise Linux 6 to trusted users only, and enforce strict user privilege management to reduce the risk of exploitation. Implement monitoring and alerting for abnormal Ghostscript process crashes or unusual printing service disruptions to detect potential exploitation attempts early. Additionally, consider migrating legacy systems to supported Red Hat Enterprise Linux versions or alternative platforms with maintained security updates. Conduct regular security audits and user training to minimize risks associated with local user interaction requirements.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-07-20T14:53:37.544Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e84aedba0e608b4fb043b9

Added to database: 10/9/2025, 11:53:17 PM

Last enriched: 11/20/2025, 7:04:37 PM

Last updated: 12/4/2025, 8:49:19 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats