CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-29510

Medium Severity
SVRS
36/100

CVSSv3
NA/10

EPSS
0.22476/1

CVE-2024-29510 is a critical vulnerability in Artifex Ghostscript before version 10.03.1, allowing for memory corruption and SAFER sandbox bypass. This is achieved through format string injection using a uniprint device. The SOCRadar Vulnerability Risk Score (SVRS) is 36, indicating a moderate level of risk, though active exploits are available. While the CVSS score is 0, the existence of "In The Wild" exploits makes this a pressing concern. Successful exploitation could lead to arbitrary code execution and compromise of the affected system. It is important to apply the patch released in Ghostscript 10.03.1 to mitigate this vulnerability and prevent potential attacks. Failure to patch could result in significant security breaches.

In The Wild
Exploit Avaliable
2024-07-03

2024-07-08
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-29510 is a memory corruption vulnerability in Artifex Ghostscript before 10.03.1. This vulnerability allows an attacker to bypass the SAFER sandbox and execute arbitrary code on the target system. The CVSS score for this vulnerability is 0, indicating that it is not considered a critical vulnerability. However, the SOCRadar Vulnerability Risk Score (SVRS) for this vulnerability is 40, indicating that it is a moderate risk. This is because the vulnerability is actively exploited in the wild, and there are known threat actors who are targeting this vulnerability.

Key Insights

  • This vulnerability is actively exploited in the wild, and there are known threat actors who are targeting this vulnerability.
  • The vulnerability allows an attacker to bypass the SAFER sandbox and execute arbitrary code on the target system.
  • The vulnerability is present in Artifex Ghostscript before 10.03.1.
  • The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability, calling for immediate and necessary measures.

Mitigation Strategies

  • Update Artifex Ghostscript to version 10.03.1 or later.
  • Disable the uniprint device.
  • Implement a web application firewall (WAF) to block malicious requests.
  • Monitor your systems for suspicious activity.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

TitleSoftware LinkDate
swsmith2391/CVE-2024-29510https://github.com/swsmith2391/CVE-2024-295102024-07-09
Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CISA Warns of Actively Exploited RCE Flaw in GeoServer GeoTools Software - The Hacker News
2024-07-16
CISA Warns of Actively Exploited RCE Flaw in GeoServer GeoTools Software - The Hacker News | News Content: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting OSGeo GeoServer GeoTools to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. GeoServer is an open-source software server written in Java that allows users to share and edit geospatial data. It is the reference implementation of the Open Geospatial Consortium (OGC) Web Feature Service (WFS) and Web Coverage Service (WCS) standards. The vulnerability, tracked as CVE-2024-36401 (CVSS score: 9.8), concerns a
google.com
rss
forum
news
Must Read - Security Affairs
2023-08-27
Must Read - Security Affairs | News Content: SideWinder phishing campaign targets maritime facilities in multiple countries The APT group SideWinder launched a new espionage campaign targeting ports and maritime facilities in the Indian Ocean and Mediterranean Sea. SideWinder (also known as Razor Tiger, Rattlesnake, and T-APT-04) has been active since at least 2012, the group mainly targeted Police, Military, Maritime, and the Naval forces of Central Asian countries. In the 2022 […] A crafty phishing campaign targets Microsoft OneDrive users Researchers detected a sophisticated phishing campaign targeting Microsoft OneDrive users to trick them into executing a PowerShell script. Over the
google.com
rss
forum
news
Must Read - Security Affairs
2023-08-27
Must Read - Security Affairs | URL: https://securityaffairs.com/must-read. Publication date: 2023-08-27 16:37:21 News Content: A crafty phishing campaign targets Microsoft OneDrive users to trick them into executing a PowerShell script. Over the past few weeks, the Trellix Advanced Research Center observed a sophisticated phishing campaign targeting Microsoft OneDrive users. Threat actors rely on social engineering tactics to trick users into executing a PowerShell script, which leads to […] | Description: A crafty phishing campaign targets Microsoft OneDrive users to trick them into executing a PowerShell script. Over the past few weeks, the Trellix Advanced Research Center observed a
google.com
rss
forum
news
Must Read - Security Affairs
2023-08-27
Must Read - Security Affairs | News Content: Ransomware gangs exploit recently patched VMware ESXi bug CVE-2024-37085 Microsoft warns that ransomware gangs are exploiting the recently patched CVE-2024-37085 flaw in VMware ESXi flaw. Microsoft researchers warned that multiple ransomware gangs are exploiting the recently patched vulnerability CVE-2024-37085 (CVSS score of 6.8) in VMware ESXi flaw. “Microsoft researchers have uncovered a vulnerability in ESXi hypervisors being exploited by several ransomware operators to obtain full […] Acronis Cyber Infrastructure bug actively exploited in the wild Acronis warns of a critical vulnerability in its Acronis Cyber Infrastructure (ACI) solution that
google.com
rss
forum
news
Metasploit Weekly Wrap-Up 07/26/2024
Jacquie Harris2024-07-26
Metasploit Weekly Wrap-Up 07/26/2024 | New module content (3) Magento XXE Unserialize Arbitrary File Read Authors: Heyder and Sergey Temnikov Type: Auxiliary Pull request: #19304 contributed by heyder Path: gather/magento_xxe_cve_2024_34102 AttackerKB reference: <a href="https://attackerkb.com
cve-2024-34102
cve-2024-29510
cve-2022-1373
cve-2022-2334
Security Affairs newsletter Round 480 by Pierluigi Paganini – INTERNATIONAL EDITION
Pierluigi Paganini2024-07-14
Security Affairs newsletter Round 480 by Pierluigi Paganini – INTERNATIONAL EDITION | A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Vyacheslav Igorevich Penchukov was sentenced to prison for his role in Zeus and IcedID operations Rite Aid disclosed [&#8230;] A new round of the weekly SecurityAffairs newsletter arrived
securityaffairs.co
rss
forum
news
Working Demo of Ghostscript Linux Vulnerability CVE-2024-29510
/u/Waldorf42024-07-13
Working Demo of Ghostscript Linux Vulnerability CVE-2024-29510 | &#32; submitted by &#32; /u/Waldorf4 [link] &#32;
cve-2024-29510
domains
urls
cves

Social Media

New Ghostscript update can negate CVE-2024-29510—got yours yet? Keep Linux systems safe! 🆙✅ https://t.co/73ORF982of #ghostscript #InfoSec #SecurityTools
0
1
2
Aware of the RCE threat in Ghostscript? CVE-2024-29510 awaits—do your users know the risks? 🧑‍🏫🔗 https://t.co/73ORF982of #ghostscript #Cybersec #DataBreach
0
0
0
Intruders might exploit CVE-2024-29510 to run commands in Ghostscript. Are you monitoring? 🖥️👀 https://t.co/73ORF982of #ghostscript #InfoSec #ThreatAlert
0
0
0
Have you checked Ghostscript usage in your org? CVE-2024-29510 reminds us—know your tools! 🔍 🛠️ https://t.co/73ORF982of #ghostscript #CyberAttack #EthicalHacking
0
0
0
CVE-2024-29510: A simple patch or a wake-up call for consistent security audits on Linux? ☎️🔐 https://t.co/73ORF982of #ghostscript #InfoSec #TechSecurity
0
0
0
How well do you trust your files? RCE bugs like CVE-2024-29510 in Ghostscript can deceive! 📂 🐍 https://t.co/73ORF982of #ghostscript #CyberAttack #DataBreach
0
0
0
CVE-2024-29510 hit Ghostscript hard. Has your Linux system survived unscathed? 🐧 🔒 https://t.co/73ORF982of #ghostscript #MalwareProtection #BackdoorThreat
0
0
0
Did you patch Ghostscript CVE-2024-29510 yet? Malicious Postscript files could be hiding as JPGs! 🖼️ 🔐 https://t.co/73ORF982of #ghostscript #NetworkSecurity #Malware
0
0
1
🚨 New Blog Post Alert! Discover key Linux detection opportunities for the recent ghostscript RCE, CVE-2024-29510. Learn how to enhance your threat detection strategies and keep your systems secure here: https://t.co/zgVco7lGZq #detectionengineering #threathunting #linux
0
0
0
@binitamshah CVE-2024-29510 Understanding the exploitation of Ghostscript using format strings is vital for improving security measures. The working demo provides practical insights into the vulnerability.
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://bugs.ghostscript.com/show_bug.cgi?id=707662
[email protected]https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/
[email protected]https://www.openwall.com/lists/oss-security/2024/07/03/7
GITHUBhttps://www.openwall.com/lists/oss-security/2024/07/03/7

CWE Details

CWE IDCWE NameDescription
CWE-693Protection Mechanism FailureThe product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence