CVE-2025-27835: n/a
An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs when converting glyphs to Unicode in psi/zbfont.c.
AI Analysis
Technical Summary
CVE-2025-27835 is a buffer overflow vulnerability identified in Artifex Ghostscript, a widely used interpreter for PostScript and PDF files, specifically in versions prior to 10.05.0. The vulnerability arises in the psi/zbfont.c source file during the conversion process of glyphs to Unicode characters. This buffer overflow is classified under CWE-120, indicating a classic memory corruption issue where data exceeding buffer boundaries can overwrite adjacent memory. The vulnerability can be exploited locally without requiring privileges (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), but it does require user interaction (UI:R), such as opening or processing a crafted document. The impact is severe, affecting confidentiality, integrity, and availability (C:H/I:H/A:H), potentially allowing an attacker to execute arbitrary code, crash the application, or escalate privileges. Although no known exploits are currently reported in the wild, the high CVSS score of 7.8 reflects the significant risk posed by this vulnerability. Ghostscript is commonly integrated into document processing pipelines, printing services, and PDF rendering applications, making this vulnerability relevant to many environments that handle PostScript or PDF files. The absence of patch links suggests that remediation involves upgrading to version 10.05.0 or later, where the issue is fixed.
Potential Impact
For European organizations, the impact of CVE-2025-27835 can be substantial, especially in sectors relying heavily on document processing, printing, and publishing workflows that utilize Ghostscript. Exploitation could lead to unauthorized code execution, data leakage, or denial of service, compromising sensitive information and disrupting business operations. Industries such as legal, financial services, government agencies, and media companies are particularly vulnerable due to their frequent handling of complex document formats. Additionally, organizations using Ghostscript in automated document conversion or printing servers may face operational downtime or data integrity issues. The requirement for user interaction means phishing or social engineering could be vectors for exploitation, increasing the risk in environments with less stringent user awareness. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
To mitigate CVE-2025-27835, European organizations should prioritize upgrading Artifex Ghostscript to version 10.05.0 or later, where the vulnerability is resolved. Until upgrades are applied, organizations should implement strict input validation and sanitization for all documents processed by Ghostscript to reduce the risk of malicious payloads. Employ sandboxing or containerization techniques to isolate Ghostscript processes, limiting the potential impact of exploitation. Monitoring and logging usage of Ghostscript can help detect anomalous behavior indicative of exploitation attempts. User training to recognize suspicious documents and avoid opening untrusted files is critical due to the required user interaction for exploitation. Additionally, organizations should review and restrict permissions of Ghostscript processes to minimize privilege escalation risks. Regular vulnerability scanning and patch management processes should be enforced to ensure timely updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-27835: n/a
Description
An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs when converting glyphs to Unicode in psi/zbfont.c.
AI-Powered Analysis
Technical Analysis
CVE-2025-27835 is a buffer overflow vulnerability identified in Artifex Ghostscript, a widely used interpreter for PostScript and PDF files, specifically in versions prior to 10.05.0. The vulnerability arises in the psi/zbfont.c source file during the conversion process of glyphs to Unicode characters. This buffer overflow is classified under CWE-120, indicating a classic memory corruption issue where data exceeding buffer boundaries can overwrite adjacent memory. The vulnerability can be exploited locally without requiring privileges (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), but it does require user interaction (UI:R), such as opening or processing a crafted document. The impact is severe, affecting confidentiality, integrity, and availability (C:H/I:H/A:H), potentially allowing an attacker to execute arbitrary code, crash the application, or escalate privileges. Although no known exploits are currently reported in the wild, the high CVSS score of 7.8 reflects the significant risk posed by this vulnerability. Ghostscript is commonly integrated into document processing pipelines, printing services, and PDF rendering applications, making this vulnerability relevant to many environments that handle PostScript or PDF files. The absence of patch links suggests that remediation involves upgrading to version 10.05.0 or later, where the issue is fixed.
Potential Impact
For European organizations, the impact of CVE-2025-27835 can be substantial, especially in sectors relying heavily on document processing, printing, and publishing workflows that utilize Ghostscript. Exploitation could lead to unauthorized code execution, data leakage, or denial of service, compromising sensitive information and disrupting business operations. Industries such as legal, financial services, government agencies, and media companies are particularly vulnerable due to their frequent handling of complex document formats. Additionally, organizations using Ghostscript in automated document conversion or printing servers may face operational downtime or data integrity issues. The requirement for user interaction means phishing or social engineering could be vectors for exploitation, increasing the risk in environments with less stringent user awareness. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
To mitigate CVE-2025-27835, European organizations should prioritize upgrading Artifex Ghostscript to version 10.05.0 or later, where the vulnerability is resolved. Until upgrades are applied, organizations should implement strict input validation and sanitization for all documents processed by Ghostscript to reduce the risk of malicious payloads. Employ sandboxing or containerization techniques to isolate Ghostscript processes, limiting the potential impact of exploitation. Monitoring and logging usage of Ghostscript can help detect anomalous behavior indicative of exploitation attempts. User training to recognize suspicious documents and avoid opening untrusted files is critical due to the required user interaction for exploitation. Additionally, organizations should review and restrict permissions of Ghostscript processes to minimize privilege escalation risks. Regular vulnerability scanning and patch management processes should be enforced to ensure timely updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-03-07T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69091542c28fd46ded7bb2e7
Added to database: 11/3/2025, 8:49:06 PM
Last enriched: 11/3/2025, 9:08:00 PM
Last updated: 11/5/2025, 1:57:21 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumCVE-2025-58337: CWE-284 Improper Access Control in Apache Software Foundation Apache Doris-MCP-Server
UnknownCVE-2025-12469: CWE-862 Missing Authorization in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumCVE-2025-12468: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.