Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-29506: n/a

0
Medium
VulnerabilityCVE-2024-29506cvecve-2024-29506
Published: Wed Jul 03 2024 (07/03/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Artifex Ghostscript before 10.03.0 has a stack-based buffer overflow in the pdfi_apply_filter() function via a long PDF filter name.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:43:29 UTC

Technical Analysis

CVE-2024-29506 identifies a stack-based buffer overflow vulnerability in the pdfi_apply_filter() function of Artifex Ghostscript versions prior to 10.03.0. Ghostscript is a widely used interpreter for PostScript and PDF files, often embedded in document processing and printing workflows. The vulnerability arises when the function processes a PDF filter name that exceeds expected length limits, causing a buffer overflow on the stack (CWE-120). This overflow can overwrite adjacent memory, potentially leading to program crashes or controlled manipulation of execution flow. The attack vector is remote network (AV:N), requiring no privileges (PR:N) but does require user interaction (UI:R), such as opening a crafted PDF file. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS v3.1 base score is 5.4, indicating medium severity with impact primarily on availability (A:L) and limited integrity impact (I:L), but no confidentiality loss (C:N). No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported. The vulnerability is significant because Ghostscript is embedded in many document processing systems, and malicious PDFs could be used as an attack vector in targeted or opportunistic attacks.

Potential Impact

The primary impact of CVE-2024-29506 is the potential for denial of service through application crashes when processing malicious PDF files containing overly long filter names. In some scenarios, the buffer overflow could be leveraged to execute arbitrary code, though this is not confirmed and would require precise exploitation techniques. Organizations relying on Ghostscript for PDF rendering, printing, or conversion—especially in automated workflows—may face service disruptions or compromise of system integrity. This could affect document management systems, print servers, and software development environments that integrate Ghostscript. The vulnerability does not directly impact confidentiality but could be a foothold for further attacks if exploited for code execution. The lack of authentication requirements and the need only for user interaction increase the risk, especially in environments where untrusted PDFs are handled. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits in the future.

Mitigation Recommendations

To mitigate CVE-2024-29506, organizations should upgrade Artifex Ghostscript to version 10.03.0 or later once available, as this version addresses the buffer overflow. Until a patch is applied, implement strict input validation and filtering on PDF files entering the environment, especially from untrusted sources. Employ sandboxing or containerization for Ghostscript processes to limit the impact of potential exploitation. Disable or restrict PDF filter features if not required by the workflow. Monitor logs for crashes or unusual behavior in Ghostscript-related services. Educate users to avoid opening suspicious PDF files and use email gateways or endpoint protection solutions that scan and block malicious documents. For environments where immediate patching is not feasible, consider replacing Ghostscript with alternative PDF processing tools that do not have this vulnerability. Regularly review and update security policies regarding document handling and processing.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6da0b7ef31ef0b5897f7

Added to database: 2/25/2026, 9:46:08 PM

Last enriched: 2/26/2026, 10:43:29 PM

Last updated: 4/12/2026, 7:55:15 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses