Monday, April 28, 2025
HomeCVE/vulnerabilityGhostscript Rendering Platform Vulnerability Let Attackers Execute Remote Code

Ghostscript Rendering Platform Vulnerability Let Attackers Execute Remote Code

Published on

SIEM as a Service

Follow Us on Google News

A critical vulnerability has been discovered in the Ghostscript rendering platform, identified as CVE-2024-29510.

This flaw, a format string vulnerability, affects versions up to 10.03.0 and allows attackers to bypass the -dSAFER sandbox, leading to remote code execution (RCE).

This vulnerability has significant implications for web applications and services that utilize Ghostscript for document conversion and preview functionalities.

- Advertisement - Google News

Ghostscript, a Postscript interpreter and document conversion toolkit, has evolved from a UNIX tool for printers to a widely used component in automated systems, as reported by Codeanlabs.

Many web applications, including chat programs and cloud storage services, rely on Ghostscript for handling and converting user-supplied files.

Despite efforts to enhance security through sandboxing, vulnerabilities like CVE-2024-29510 highlight the ongoing risks.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

CVE-2024-29510 – The Vulnerability

The vulnerability exploits Ghostscript’s handling of format strings, allowing an attacker to manipulate memory and execute arbitrary code.

The -dSAFER sandbox, designed to restrict dangerous operations, can be bypassed through this flaw.

The vulnerability is particularly concerning because it can be triggered by uploading a specially crafted EPS file or embedding the exploit in a LibreOffice document.

Exploit Code Example

Below is a simplified version of the exploit code that demonstrates how an attacker can execute arbitrary commands:

% Subtract a bit from the address to make sure we write a null over the field

/PtrTarget -3 PtrPathControlActive ptr_add_offset def

% And overwrite it!

IdxStackControllable PtrTarget write_to

% And now path_control_active == 0, so we can use %pipe% as if -dSAFER was never set :)

(%pipe%gnome-calculator) (r) file

This code effectively disables the -dSAFER sandbox, allowing the execution of the gnome-calculator command.

The command can be replaced with any other command to suit the attacker’s needs.

Impact

The impact of CVE-2024-29510 is far-reaching.

Web applications and services that use Ghostscript for document processing are at risk.

Attackers can exploit this vulnerability to execute arbitrary code on the server, potentially leading to data breaches, system compromise, and further attacks.

To mitigate this vulnerability, it is crucial to update Ghostscript to version 10.03.1 or later.

Check for patch versions that address this issue if the latest version is unavailable for your distribution.

Additionally, consider using the provided test kit to verify if your Ghostscript installation is affected:

ghostscript -q -dNODISPLAY -dBATCH CVE-2024-29510_testkit.ps
  • 2024-03-14: Reported to the Artifex Ghostscript issue tracker.
  • 2024-03-24: CVE-2024-29510 assigned by Mitre.
  • 2024-03-28: Issue acknowledged by the developers.
  • 2024-05-02: Ghostscript 10.03.1 released, mitigating the issue.
  • 2024-07-02: Publication of the vulnerability details.

The discovery of CVE-2024-29510 underscores the importance of regular updates and security assessments for software dependencies.

Organizations using Ghostscript should promptly update to the latest version and verify their installations to prevent potential exploitation.

Maintaining a proactive approach to security can help mitigate the risks associated with such vulnerabilities.

"Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!"- Free Demo

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...