Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.
Link | Tags |
---|---|
https://bugs.ghostscript.com/show_bug.cgi?id=707662 | issue tracking |
https://www.openwall.com/lists/oss-security/2024/07/03/7 | mailing list |
https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/ | exploit third party advisory |
https://www.vicarius.io/vsociety/posts/critical-vulnerability-in-ghostscript-cve-2024-29510 | exploit third party advisory |