Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46954: n/a

0
High
VulnerabilityCVE-2024-46954cvecve-2024-46954
Published: Sun Nov 10 2024 (11/10/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in decode_utf8 in base/gp_utf8.c in Artifex Ghostscript before 10.04.0. Overlong UTF-8 encoding leads to possible ../ directory traversal.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:47:03 UTC

Technical Analysis

CVE-2024-46954 is a directory traversal vulnerability identified in the decode_utf8 function within the base/gp_utf8.c source file of Artifex Ghostscript prior to version 10.04.0. The root cause is the improper handling of overlong UTF-8 encoded sequences, which are sequences that use more bytes than necessary to represent a character. This flaw allows an attacker to craft malicious UTF-8 input that bypasses normal path validation checks, enabling traversal outside the intended directories via '../' sequences. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). Exploitation requires local access (CVSS vector AV:L) but does not require privileges (PR:N) or user interaction (UI:N). The impact is severe, affecting confidentiality, integrity, and availability (all rated high in the CVSS vector). An attacker could leverage this to read, modify, or delete arbitrary files on the system where Ghostscript is running, potentially leading to full system compromise. Ghostscript is widely used for processing PostScript and PDF files in many environments, including print servers, document management systems, and embedded devices. Although no public exploits are reported yet, the vulnerability's nature and severity make it a critical concern for organizations relying on vulnerable versions. The lack of a patch link suggests that a fix is pending or newly released, emphasizing the need for vigilance and prompt remediation once available.

Potential Impact

The vulnerability allows attackers to perform directory traversal attacks, potentially accessing or modifying sensitive files outside the intended directory scope. This can lead to unauthorized disclosure of confidential information, data tampering, or disruption of services by deleting or corrupting critical files. Since Ghostscript is often integrated into document processing pipelines, exploitation could affect a wide range of applications, including print servers, web services handling PDFs, and automated document workflows. The high CVSS score (8.4) reflects the broad impact on confidentiality, integrity, and availability. Organizations worldwide that use vulnerable Ghostscript versions risk data breaches, operational disruption, and potential lateral movement within networks if attackers gain footholds through this vulnerability. The local attack vector means that attackers need some level of access to the system, but no privileges or user interaction are required, lowering the barrier for exploitation in multi-user or shared environments.

Mitigation Recommendations

1. Immediately upgrade Ghostscript to version 10.04.0 or later once the patch is officially released to address CVE-2024-46954. 2. Until a patch is applied, restrict access to systems running vulnerable Ghostscript versions to trusted users only, minimizing local attack opportunities. 3. Implement strict input validation and sanitization on all inputs processed by Ghostscript, especially those involving UTF-8 encoded data. 4. Employ sandboxing or containerization techniques to isolate Ghostscript processes, limiting the impact of potential exploitation. 5. Monitor system logs and file access patterns for unusual directory traversal attempts or unauthorized file access related to Ghostscript usage. 6. Review and harden file system permissions to ensure that Ghostscript processes run with the least privilege necessary, preventing unauthorized file modifications. 7. Educate system administrators and security teams about this vulnerability to ensure timely detection and response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d06b7ef31ef0b56d493

Added to database: 2/25/2026, 9:43:34 PM

Last enriched: 2/26/2026, 8:47:03 AM

Last updated: 4/12/2026, 4:52:28 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses