CVE-2025-27831
Published: 25 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-27831 is a text buffer overflow vulnerability (CWE-120) discovered in Artifex Ghostscript versions before 10.05.0. The flaw affects the DOCXWRITE and TXTWRITE devices, specifically in the file devices/vector/doc_common.c, where long characters trigger the overflow.
The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable remotely with low complexity, no privileges, and no user interaction required. Attackers can leverage this to gain high-impact access, potentially achieving arbitrary code execution, data compromise, or system disruption on affected systems processing malicious inputs.
Advisories recommend upgrading to Ghostscript 10.05.0 or later to mitigate the issue. Key references include the Ghostscript bug tracker entry at https://bugs.ghostscript.com/show_bug.cgi?id=708132 and the Debian LTS announcement at https://lists.debian.org/debian-lts-announce/2025/04/msg00014.html.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Remote buffer overflow (CWE-120) in Ghostscript with CVSS 9.8 (AV:N/PR:N/UI:N) enables arbitrary code execution on systems processing malicious DOCX/TXT inputs, directly mapping to exploitation of public-facing applications using the library for document handling.