Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46955: n/a

0
Medium
VulnerabilityCVE-2024-46955cvecve-2024-46955
Published: Sun Nov 10 2024 (11/10/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0. There is an out-of-bounds read when reading color in Indexed color space.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:46:59 UTC

Technical Analysis

CVE-2024-46955 is a vulnerability identified in the psi/zcolor.c component of Artifex Ghostscript versions prior to 10.04.0. The issue arises from an out-of-bounds read when processing colors in the Indexed color space, classified under CWE-125 (Out-of-bounds Read). This flaw occurs because the code does not adequately validate the index used to access color data arrays, leading to reading memory beyond the intended buffer. The vulnerability can be triggered when a user opens or processes a crafted PostScript or PDF file that uses Indexed color spaces with maliciously crafted color indices. The CVSS 3.1 score is 5.5 (medium), with vector AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating local attack vector, low attack complexity, no privileges required, user interaction needed, unchanged scope, no confidentiality or integrity impact, but high impact on availability due to potential application crashes or denial of service. No known exploits are reported in the wild as of now. The vulnerability primarily affects systems that use Ghostscript for document rendering, printing, or conversion, especially where untrusted documents might be processed. Since Ghostscript is widely used in open-source and commercial environments for PDF and PostScript handling, this vulnerability could be leveraged to disrupt services or crash applications processing malicious documents.

Potential Impact

For European organizations, the primary impact is denial of service affecting document processing pipelines, print servers, or any automated workflows relying on Ghostscript. This could disrupt business operations, especially in sectors like government, finance, legal, and publishing, where document handling is critical. Although the vulnerability does not compromise data confidentiality or integrity, service interruptions could lead to operational delays and increased support costs. Organizations processing untrusted or user-submitted documents are at higher risk. The requirement for local access and user interaction limits remote exploitation, reducing the likelihood of widespread automated attacks. However, insider threats or targeted attacks could exploit this vulnerability to cause disruptions. Additionally, environments with automated document processing exposed to external inputs should be cautious. The lack of known exploits suggests limited immediate threat but does not preclude future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2024-46955, organizations should upgrade to Artifex Ghostscript version 10.04.0 or later where the vulnerability is patched. Until patching is possible, restrict access to Ghostscript binaries to trusted users only and avoid processing untrusted or unauthenticated documents. Implement input validation and sandboxing around document processing workflows to limit the impact of malformed files. Monitor logs for application crashes or unusual behavior in document processing systems. Employ application whitelisting and privilege restrictions to reduce the risk of exploitation. For environments where Ghostscript is integrated into larger systems, ensure those systems are updated and hardened. Regularly review and update security policies related to document handling and user permissions. Additionally, consider isolating document processing services in containers or virtual machines to contain potential denial-of-service impacts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-09-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092b7735043901e828cb41

Added to database: 11/3/2025, 10:23:51 PM

Last enriched: 11/3/2025, 10:46:59 PM

Last updated: 11/4/2025, 4:37:40 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats