Artifex Ghostscript before 10.03.1, when Tesseract is used for OCR, has a directory traversal issue that allows arbitrary file reading (and writing of error messages to arbitrary files) via OCRLanguage. For example, exploitation can use debug_file /tmp/out and user_patterns_file /etc/passwd.
History

Mon, 28 Apr 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Artifex
Artifex ghostscript
CPEs cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
Vendors & Products Artifex
Artifex ghostscript

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-07-03T00:00:00

Updated: 2024-08-02T01:10:55.453Z

Reserved: 2024-03-19T00:00:00

Link: CVE-2024-29511

cve-icon Vulnrichment

Updated: 2024-08-02T01:10:55.453Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-03T19:15:03.430

Modified: 2025-04-28T17:12:15.530

Link: CVE-2024-29511

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-07-03T00:00:00Z

Links: CVE-2024-29511 - Bugzilla