- Description
- Artifex Ghostscript before 10.03.0 has a heap-based overflow when PDFPassword (e.g., for runpdf) has a \000 byte in the middle.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- nvd@nist.gov
- CWE-787
- Hype score
- Not currently trending
[1day1line] CVE-2024-29509: Heap Buffer Overflow in Ghostscript PDFPassword Processing https://t.co/NbKfILCRbr Hello, this is clalxk. Today's "One-Line a Day" covers a heap buffer overflow vulnerability in the open-source PDF interpreter Ghostscript. This vulnerability occurs…
@hackyboiz
12 Feb 2025
1355 Impressions
9 Retweets
36 Likes
7 Bookmarks
0 Replies
0 Quotes
We've published the final part of our research into Ghostscript, leading to CVE-2024-29506, CVE-2024-29507, CVE-2024-29508, and CVE-2024-29509. Not as practically exploitable as the previous ones, but just as fun to find, hope you enjoy. https://t.co/Rc7sPXLXqJ
@thomasrinsma
31 Oct 2024
3092 Impressions
17 Retweets
63 Likes
22 Bookmarks
2 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C94A899E-28C1-4FC0-B645-B5BE7AB34082",
"versionEndExcluding": "10.03.0"
}
],
"operator": "OR"
}
]
}
]