
A series of security vulnerabilities has been identified in Artifex Ghostscript, a widely used interpreter for PostScript and Portable Document Format (PDF) files.
Ghostscript consists of a PostScript interpreter layer and a graphics library. The graphics library is shared with all the other products in the Ghostscript family, so all of these technologies are sometimes referred to as Ghostscript, rather than the more correct GhostPDL.
These vulnerabilities, if exploited, could lead to various security issues, including buffer overflows and unauthorized file access.
Vulnerability Details
The following is a summary of the identified CVEs and their potential impact:
- CVE-2025-27835 (CVSS 7.8): A buffer overflow vulnerability exists when converting glyphs to Unicode in psi/zbfont.c.
- CVE-2025-27832 (CVSS 9.8): A Compression buffer overflow affects the NPDL device for contrib/japanese/gdevnpdl.c.
- CVE-2025-27831 (CVSS 9.8): The DOCXWRITE TXTWRITE device is susceptible to a text buffer overflow via long characters to devices/vector/doc_common.c.
- CVE-2025-27836 (CVSS 9.8): The BJ10V device has a Print buffer overflow in contrib/japanese/gdev10v.c.
- CVE-2025-27830 (CVSS 7.8): A buffer overflow occurs during serialization of DollarBlend in a font, affecting base/write_t1.c and psi/zfapi.c.
- CVE-2025-27833 (CVSS 7.8): A buffer overflow can be triggered by a long TTF font name in pdf/pdf_fmap.c.
- CVE-2025-27837 (CVSS 9.8): Arbitrary file access is possible through a truncated path with invalid UTF-8 characters, impacting base/gp_mswin.c and base/winrtsup.cpp.
- CVE-2025-27834 (CVSS 7.8): A buffer overflow can occur via an oversized Type 4 function in a PDF document to pdf/pdf_func.c.
Security Implications
The high CVSS scores associated with several of these vulnerabilities (CVE-2025-27832, CVE-2025-27831, CVE-2025-27836, and CVE-2025-27837 all with a CVSS of 9.8) indicate a critical level of severity. Exploitation of these vulnerabilities could allow attackers to execute arbitrary code, potentially gaining control of affected systems. Buffer overflows, in particular, are a common attack vector. The arbitrary file access vulnerability is also highly concerning as it could lead to data breaches and further system compromise.
Recommendations
Users of Ghostscript are strongly advised to update to version 10.05.0 or later to mitigate these risks. It is crucial to apply security patches promptly to protect systems from potential exploitation. Developers using Ghostscript libraries should also review their code to ensure they are not inadvertently creating or relying on the identified vulnerabilities.
Related Posts:
- Flaw in Ghostscript Could Allow Command Execution
- Ghostscript Patches Multiple Vulnerabilities, Potential for Arbitrary Code Execution
- Ghostscript Update Patches Six Critical Vulnerabilities: Code Execution, Buffer Overflow, and Path Traversal Risks
- Researcher Releases PoC for Critical RCE Ghostscript Vulnerability
- Buffer Overflows Vulnerabilities: CISA & FBI Issue Urgent Warning