描述
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
AI分析AI驱动
受影响产品
artifexghostscript
参考资料
- https://bugs.ghostscript.com/show_bug.cgi?id=707662Issue Tracking
- https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/ExploitThird Party Advisory
- https://www.openwall.com/lists/oss-security/2024/07/03/7Mailing List
- https://bugs.ghostscript.com/show_bug.cgi?id=707662Issue Tracking
- https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/ExploitThird Party Advisory
- https://www.openwall.com/lists/oss-security/2024/07/03/7Mailing List
- https://www.vicarius.io/vsociety/posts/critical-vulnerability-in-ghostscript-cve-2024-29510ExploitThird Party Advisory