Description
Artifex Ghostscript before 10.03.1, when Tesseract is used for OCR, has a directory traversal issue that allows arbitrary file reading (and writing of error messages to arbitrary files) via OCRLanguage. For example, exploitation can use debug_file /tmp/out and user_patterns_file /etc/passwd.
Published: 2024-07-03
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-6897-1 Ghostscript vulnerabilities
History

Mon, 28 Apr 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Artifex
Artifex ghostscript
CPEs cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
Vendors & Products Artifex
Artifex ghostscript

Subscriptions

Artifex Ghostscript
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T01:10:55.453Z

Reserved: 2024-03-19T00:00:00.000Z

Link: CVE-2024-29511

cve-icon Vulnrichment

Updated: 2024-08-02T01:10:55.453Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-03T19:15:03.430

Modified: 2025-04-28T17:12:15.530

Link: CVE-2024-29511

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-07-03T00:00:00Z

Links: CVE-2024-29511 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses