Vulnerability Details : CVE-2024-29510
Public exploit exists!
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
Vulnerability category: Memory Corruption
Products affected by CVE-2024-29510
- cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-29510
5.74%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2024-29510
-
Ghostscript Command Execution via Format String
Disclosure Date: 2024-03-14First seen: 2024-07-20exploit/multi/fileformat/ghostscript_format_string_cve_2024_29510This module exploits a format string vulnerability in Ghostscript versions before 10.03.1 to achieve a SAFER sandbox bypass and execute arbitrary commands. This vulnerability is reachable via libraries such as ImageMagick. This exploit only works a
CVSS scores for CVE-2024-29510
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.3
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N |
1.8
|
4.0
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-07-08 |
CWE ids for CVE-2024-29510
-
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2024-29510
-
https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/
CVE-2024-29510 - Exploiting Ghostscript using format strings — Codean LabsExploit;Third Party Advisory
-
https://www.openwall.com/lists/oss-security/2024/07/03/7
oss-security - Re: Ghostscript 10.03.1 (2024-05-02) fixed 5 CVEs including CVE-2024-33871 arbitrary code executionMailing List
-
https://bugs.ghostscript.com/show_bug.cgi?id=707662
707662 – Format string injection leads to shell command execution (SAFER bypass)Issue Tracking
-
https://www.vicarius.io/vsociety/posts/critical-vulnerability-in-ghostscript-cve-2024-29510
Critical Vulnerability in Ghostscript (CVE-2024-29510) - vsocietyExploit;Third Party Advisory
Jump to