{"id":165449,"date":"2024-07-08T18:12:51","date_gmt":"2024-07-08T18:12:51","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=165449"},"modified":"2024-07-08T18:12:53","modified_gmt":"2024-07-08T18:12:53","slug":"ghostscript-vulnerability-cve-2024-29510","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/165449\/hacking\/ghostscript-vulnerability-cve-2024-29510.html","title":{"rendered":"Critical Ghostscript flaw exploited in the wild. Patch it now!"},"content":{"rendered":"
<\/div>\n

Threat actors are exploiting Ghostscript vulnerability CVE-2024-29510 to bypass the sandbox and achieve remote code execution.<\/h2>\n\n\n\n

Threat actors are actively exploiting a Ghostscript vulnerability, tracked as CVE-2024-29510, that can allow them to escape the –dSAFER<\/em> sandbox and achieve remote code execution.<\/p>\n\n\n\n

Ghostscript is an interpreter for the PostScript language and for PDF files. It is used primarily for processing and rendering documents in these formats.<\/gwmw><\/p>\n\n\n\n

Researchers at Codean Labs discovered six vulnerabilities<\/a>\u00a0(CVE-2024-29510, CVE-2024-29509, CVE-2024-29506, CVE-2024-29507, CVE-2024-29508, CVE-2024-29511) that were addressed with versions 10.03.0 and 10.03.1.<\/p>\n\n\n\n

The flaw CVE-2024-29510 is a format string vulnerability that impacts Ghostscript versions \u2264 10.03.0. <\/p>\n\n\n\n

The vulnerability has an important impact on web applications and services using Ghostscript for document conversion and previews. <\/p>\n\n\n\n

\n

We found #CVE<\/a>-2024-29510, a format string vulnerability in Ghostscript \u2264 10.03.0. It enables attackers to gain Remote Code Execution (#RCE<\/a>) while also bypassing all sandbox protections. It has significant impact so please update Ghostscript!https:\/\/t.co\/6DxCfe3neU<\/a><\/p>— Codean (@CodeanIO) July 2, 2024<\/a><\/blockquote>