Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46956: n/a

0
High
VulnerabilityCVE-2024-46956cvecve-2024-46956
Published: Sun Nov 10 2024 (11/10/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in psi/zfile.c in Artifex Ghostscript before 10.04.0. Out-of-bounds data access in filenameforall can lead to arbitrary code execution.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:47:08 UTC

Technical Analysis

CVE-2024-46956 is a vulnerability identified in the psi/zfile.c source file of Artifex Ghostscript versions before 10.04.0. The issue arises from an out-of-bounds data access in the filenameforall function, which is part of the file handling subsystem. This memory safety flaw is classified under CWE-125 (Out-of-bounds Read), allowing an attacker to manipulate the program's memory access patterns. Exploiting this vulnerability can lead to arbitrary code execution, enabling an attacker to run malicious code with the privileges of the Ghostscript process. The CVSS 3.1 base score is 7.8, indicating high severity, with an attack vector classified as local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No public exploits have been reported yet, but the vulnerability poses a significant risk due to the widespread use of Ghostscript for processing PostScript and PDF files in various applications and services. The lack of a patch link suggests that users should monitor official channels for updates or consider workarounds to mitigate risk until a patch is available.

Potential Impact

The vulnerability allows arbitrary code execution, which can compromise the confidentiality, integrity, and availability of affected systems. For European organizations, this means that attackers could potentially execute malicious code locally, leading to data breaches, system compromise, or denial of service. Organizations that rely on Ghostscript for document processing, especially in sectors like government, finance, publishing, and legal services, are at higher risk. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk, as attackers could leverage social engineering or insider threats. The high impact on all security properties makes this vulnerability critical for environments where Ghostscript is integrated into automated workflows or exposed to untrusted inputs.

Mitigation Recommendations

1. Upgrade to Artifex Ghostscript version 10.04.0 or later as soon as the patch becomes available. 2. Until patched, restrict access to systems running vulnerable Ghostscript versions, limiting user permissions and network exposure. 3. Implement strict input validation and sandboxing for any service or application invoking Ghostscript to process untrusted files. 4. Monitor logs for unusual activity related to Ghostscript usage, especially attempts to process malformed or suspicious PostScript/PDF files. 5. Educate users about the risks of opening untrusted documents that might trigger Ghostscript processing. 6. Consider disabling or replacing Ghostscript in workflows where feasible, or use containerization to isolate its execution environment. 7. Stay updated with vendor advisories and threat intelligence feeds for any emerging exploit information.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-09-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092b7735043901e828cb48

Added to database: 11/3/2025, 10:23:51 PM

Last enriched: 11/3/2025, 10:47:08 PM

Last updated: 11/4/2025, 11:00:55 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats