CVE-2024-29509
Artifex
CVE-2024-29509: Heap-based overflow in Artifex Ghostscript before 10.03.0 when processing PDFs with passwords containing null bytes. This vulnerability allows attackers to potentially execute arbitrary code or cause a denial-of-service. The vulnerability lies in how Ghostscript handles PDF passwords (e.g., for runpdf) that include a \000 byte within the password string.
With a CVSS score of 8.8, it's a high-severity issue, further emphasized by a SOCRadar Vulnerability Risk Score (SVRS) of 77, indicating a significant risk level just below the "critical" threshold requiring immediate attention. Although not exceeding 80, this SVRS signifies elevated risk due to real-world exploitability via social media mentions, dark web discussions, and code repository activity. Successful exploitation could lead to unauthorized access, data breaches, or system instability, impacting organizations relying on Ghostscript for PDF processing. The presence of "In The Wild" tag indicates active exploitation.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.