CVE-2024-29510

Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
Configurations

No configuration.

History

21 Nov 2024, 09:08

Type Values Removed Values Added
References
  • () https://www.vicarius.io/vsociety/posts/critical-vulnerability-in-ghostscript-cve-2024-29510 -
References () https://bugs.ghostscript.com/show_bug.cgi?id=707662 - () https://bugs.ghostscript.com/show_bug.cgi?id=707662 -
References () https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/ - () https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/ -
References () https://www.openwall.com/lists/oss-security/2024/07/03/7 - () https://www.openwall.com/lists/oss-security/2024/07/03/7 -

08 Jul 2024, 14:18

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.3
CWE CWE-693

05 Jul 2024, 12:55

Type Values Removed Values Added
Summary
  • (es) Artifex Ghostscript anterior a 10.03.1 permite la corrupción de la memoria y una omisión MÁS SEGURA de la sandbox mediante la inyección de cadena de formato con un dispositivo uniprint.

03 Jul 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-03 19:15

Updated : 2024-11-21 09:08


NVD link : CVE-2024-29510

Mitre link : CVE-2024-29510

CVE.ORG link : CVE-2024-29510


JSON object : View

Products Affected

No product.

CWE
CWE-693

Protection Mechanism Failure