Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46953: n/a

0
High
VulnerabilityCVE-2024-46953cvecve-2024-46953
Published: Sun Nov 10 2024 (11/10/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in base/gsdevice.c in Artifex Ghostscript before 10.04.0. An integer overflow when parsing the filename format string (for the output filename) results in path truncation, and possible path traversal and code execution.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:46:38 UTC

Technical Analysis

CVE-2024-46953 is a vulnerability identified in the base/gsdevice.c component of Artifex Ghostscript versions prior to 10.04.0. The flaw arises from an integer overflow during the parsing of the filename format string used to generate output filenames. This overflow can lead to path truncation, which in turn may allow an attacker to perform path traversal attacks. Such traversal can enable unauthorized file access or overwriting critical files, potentially leading to arbitrary code execution within the context of the Ghostscript process. The vulnerability is classified under CWE-190 (Integer Overflow or Wraparound). Exploitation requires local access and user interaction but does not require elevated privileges, making it a significant risk in environments where users can process untrusted PostScript or PDF files. The CVSS v3.1 score is 7.8 (high), reflecting the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and no privileges required. No public exploits are known at this time, but the potential for code execution makes this a critical patching priority. Ghostscript is widely used in document rendering, printing, and PDF processing workflows, making this vulnerability relevant to many organizations that rely on these services.

Potential Impact

For European organizations, the impact of CVE-2024-46953 can be substantial. Ghostscript is commonly integrated into document management systems, printing services, and PDF processing pipelines across various sectors including government, finance, legal, and publishing. Exploitation could allow attackers to execute arbitrary code, leading to data breaches, system compromise, or disruption of critical document workflows. Confidentiality is at risk due to potential unauthorized file access; integrity can be compromised by overwriting or tampering with files; and availability may be affected if the system is destabilized or taken offline. Given the requirement for local access and user interaction, insider threats or phishing attacks that trick users into processing malicious files are plausible attack vectors. The absence of known exploits in the wild reduces immediate risk but does not diminish the urgency of remediation due to the high severity and potential impact.

Mitigation Recommendations

To mitigate CVE-2024-46953, organizations should immediately upgrade Ghostscript to version 10.04.0 or later where the vulnerability is patched. Until patching is possible, restrict access to systems running vulnerable Ghostscript versions, especially limiting local user permissions and controlling file upload and processing workflows. Implement strict input validation and scanning of files before processing with Ghostscript to detect malicious payloads. Employ application whitelisting and sandboxing techniques to isolate Ghostscript processes and minimize potential damage from exploitation. Regularly audit logs for unusual file access or execution patterns. Educate users about the risks of processing untrusted documents and enforce policies to reduce the likelihood of user interaction with malicious files. Finally, monitor threat intelligence sources for any emerging exploit activity related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-09-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092b7735043901e828cb3a

Added to database: 11/3/2025, 10:23:51 PM

Last enriched: 11/3/2025, 10:46:38 PM

Last updated: 12/20/2025, 5:17:52 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats