Ghostscript Rendering Platform Vulnerability Let Attackers Execute Remote Code

A critical vulnerability has been discovered in the Ghostscript rendering platform, identified as CVE-2024-29510.

This flaw, a format string vulnerability, affects versions up to 10.03.0 and allows attackers to bypass the -dSAFER sandbox, leading to remote code execution (RCE).

This vulnerability has significant implications for web applications and services that utilize Ghostscript for document conversion and preview functionalities.

Ghostscript, a Postscript interpreter and document conversion toolkit, has evolved from a UNIX tool for printers to a widely used component in automated systems, as reported by Codeanlabs.

Many web applications, including chat programs and cloud storage services, rely on Ghostscript for handling and converting user-supplied files.

Despite efforts to enhance security through sandboxing, vulnerabilities like CVE-2024-29510 highlight the ongoing risks.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

CVE-2024-29510 – The Vulnerability

The vulnerability exploits Ghostscript’s handling of format strings, allowing an attacker to manipulate memory and execute arbitrary code.

The -dSAFER sandbox, designed to restrict dangerous operations, can be bypassed through this flaw.

The vulnerability is particularly concerning because it can be triggered by uploading a specially crafted EPS file or embedding the exploit in a LibreOffice document.

Exploit Code Example

Below is a simplified version of the exploit code that demonstrates how an attacker can execute arbitrary commands:

% Subtract a bit from the address to make sure we write a null over the field

/PtrTarget -3 PtrPathControlActive ptr_add_offset def

% And overwrite it!

IdxStackControllable PtrTarget write_to

% And now path_control_active == 0, so we can use %pipe% as if -dSAFER was never set :)

(%pipe%gnome-calculator) (r) file

This code effectively disables the -dSAFER sandbox, allowing the execution of the gnome-calculator command.

The command can be replaced with any other command to suit the attacker’s needs.

Impact

The impact of CVE-2024-29510 is far-reaching.

Web applications and services that use Ghostscript for document processing are at risk.

Attackers can exploit this vulnerability to execute arbitrary code on the server, potentially leading to data breaches, system compromise, and further attacks.

To mitigate this vulnerability, it is crucial to update Ghostscript to version 10.03.1 or later.

Check for patch versions that address this issue if the latest version is unavailable for your distribution.

Additionally, consider using the provided test kit to verify if your Ghostscript installation is affected:

ghostscript -q -dNODISPLAY -dBATCH CVE-2024-29510_testkit.ps
  • 2024-03-14: Reported to the Artifex Ghostscript issue tracker.
  • 2024-03-24: CVE-2024-29510 assigned by Mitre.
  • 2024-03-28: Issue acknowledged by the developers.
  • 2024-05-02: Ghostscript 10.03.1 released, mitigating the issue.
  • 2024-07-02: Publication of the vulnerability details.

The discovery of CVE-2024-29510 underscores the importance of regular updates and security assessments for software dependencies.

Organizations using Ghostscript should promptly update to the latest version and verify their installations to prevent potential exploitation.

Maintaining a proactive approach to security can help mitigate the risks associated with such vulnerabilities.

"Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!"- Free Demo

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field Communication…

6 hours ago

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored entities,…

7 hours ago

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with 86%…

7 hours ago

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection

Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites, with…

7 hours ago

Russian Hackers Exploit Microsoft OAuth 2.0 to Target Organizations

Cybersecurity firm Volexity has tracked a series of highly targeted attacks by suspected Russian threat…

7 hours ago

Hackers Weaponize Google Forms to Bypass Email Security and Steal Login Credentials

Threat actors are increasingly leveraging Google Forms, the tech giant’s widely-used form and quiz-building tool,…

9 hours ago