Artifex Ghostscript before 10.03.1, when Tesseract is used for OCR, has a directory traversal issue that allows arbitrary file reading (and writing of error messages to arbitrary files) via OCRLanguage. For example, exploitation can use debug_file /tmp/out and user_patterns_file /etc/passwd.
Metrics
Affected Vendors & Products
References
History
Mon, 28 Apr 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Artifex
Artifex ghostscript |
|
CPEs | cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:* | |
Vendors & Products |
Artifex
Artifex ghostscript |

Status: PUBLISHED
Assigner: mitre
Published: 2024-07-03T00:00:00
Updated: 2024-08-02T01:10:55.453Z
Reserved: 2024-03-19T00:00:00
Link: CVE-2024-29511

Updated: 2024-08-02T01:10:55.453Z

Status : Analyzed
Published: 2024-07-03T19:15:03.430
Modified: 2025-04-28T17:12:15.530
Link: CVE-2024-29511
