Description
Artifex Ghostscript before 10.03.1, when Tesseract is used for OCR, has a directory traversal issue that allows arbitrary file reading (and writing of error messages to arbitrary files) via OCRLanguage. For example, exploitation can use debug_file /tmp/out and user_patterns_file /etc/passwd.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-6897-1 | Ghostscript vulnerabilities |
References
History
Mon, 28 Apr 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Artifex
Artifex ghostscript |
|
| CPEs | cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Artifex
Artifex ghostscript |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T01:10:55.453Z
Reserved: 2024-03-19T00:00:00.000Z
Link: CVE-2024-29511
Updated: 2024-08-02T01:10:55.453Z
Status : Analyzed
Published: 2024-07-03T19:15:03.430
Modified: 2025-04-28T17:12:15.530
Link: CVE-2024-29511
OpenCVE Enrichment
No data.
Ubuntu USN