Artifex GhostPDL New Output File Open Error devices/vector/gdevpdf.c pdf_ferror ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ

Rakkoon nageenyaa kan ସମସ୍ୟାଜନକ jedhamuun beekamu Artifex GhostPDL ଯେପର୍ଯ୍ୟନ୍ତ 3989415a5b8e99b9d1b87cc9902bde9b7cdea145 keessatti argameera. Kan miidhamte is hojii pdf_ferror faayilii devices/vector/gdevpdf.c keessa kutaa New Output File Open Error Handler keessa. Hojii jijjiirraa gara ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ geessa. CWE fayyadamuun rakkoo ibsuun gara CWE-476 geessa. Dadhabbii kana yeroo 07/11/2025 maxxanfameera akka 619a106ba4c4. Odeeffannoon kun buufachuuf cgit.ghostscript.com irratti qoodameera. Dogoggorri kun akka CVE-2025-7462tti beekama. Yaaliin weeraraa fageenya irraa jalqabamuu ni danda'a. Faayidaaleen teeknikaa ni jiru. Meeshaa balaa kana fayyadamuuf hin jiru. Amma, gatii ammee exploit might be approx. USD $0-$5k ta'uu danda'a. Akka ଅପରିଭାଷିତ jedhamee ibsameera. Akka 0-daytti, gatii daldalaa dhoksaa tilmaamame $0-$5k ta'ee ture. Beekamtii paachii kanaa 619a106ba4c4abed95110f84d5efcd7aee38c7cb dha. Sirreeffamni rakkoo cgit.ghostscript.com irratti buufachuuf qophaa’eera. Paachii itti fayyadamuun rakkoo kana furuuf ni gorfama. Hanqinni kunis bu'uuraalee odeeffannoo hanqina biroo keessatti galmaa'ee jira: Tenable (243496). Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

4 ଆଡାପ୍ଟେସନ୍ · 90 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
07/11/2025 01:34 PM
ଅଦ୍ୟତନ 1/3
07/12/2025 09:09 AM
ଅଦ୍ୟତନ 2/3
07/12/2025 12:19 PM
ଅଦ୍ୟତନ 3/3
08/05/2025 04:01 PM
software_vendorArtifexArtifexArtifexArtifex
software_nameGhostPDLGhostPDLGhostPDLGhostPDL
software_version<=3989415a5b8e99b9d1b87cc9902bde9b7cdea145<=3989415a5b8e99b9d1b87cc9902bde9b7cdea145<=3989415a5b8e99b9d1b87cc9902bde9b7cdea145<=3989415a5b8e99b9d1b87cc9902bde9b7cdea145
software_componentNew Output File Open Error HandlerNew Output File Open Error HandlerNew Output File Open Error HandlerNew Output File Open Error Handler
software_filedevices/vector/gdevpdf.cdevices/vector/gdevpdf.cdevices/vector/gdevpdf.cdevices/vector/gdevpdf.c
software_functionpdf_ferrorpdf_ferrorpdf_ferrorpdf_ferror
vulnerability_cweCWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)
vulnerability_risk1111
cvss3_vuldb_avNNNN
cvss3_vuldb_acLLLL
cvss3_vuldb_prNNNN
cvss3_vuldb_uiRRRR
cvss3_vuldb_sUUUU
cvss3_vuldb_cNNNN
cvss3_vuldb_iNNNN
cvss3_vuldb_aLLLL
cvss3_vuldb_rlOOOO
cvss3_vuldb_rcCCCC
advisory_identifier619a106ba4c4619a106ba4c4619a106ba4c4619a106ba4c4
advisory_urlhttps://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=619a106ba4c4https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=619a106ba4c4https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=619a106ba4c4https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=619a106ba4c4
countermeasure_nameପ୍ୟାଚ୍ପ୍ୟାଚ୍ପ୍ୟାଚ୍ପ୍ୟାଚ୍
patch_name619a106ba4c4abed95110f84d5efcd7aee38c7cb619a106ba4c4abed95110f84d5efcd7aee38c7cb619a106ba4c4abed95110f84d5efcd7aee38c7cb619a106ba4c4abed95110f84d5efcd7aee38c7cb
countermeasure_patch_urlhttps://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=619a106ba4c4https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=619a106ba4c4https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=619a106ba4c4https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=619a106ba4c4
source_cveCVE-2025-7462CVE-2025-7462CVE-2025-7462CVE-2025-7462
cna_responsibleVulDBVulDBVulDBVulDB
cvss2_vuldb_avNNNN
cvss2_vuldb_acLLLL
cvss2_vuldb_auNNNN
cvss2_vuldb_ciNNNN
cvss2_vuldb_iiNNNN
cvss2_vuldb_aiPPPP
cvss2_vuldb_rcCCCC
cvss2_vuldb_rlOFOFOFOF
cvss4_vuldb_avNNNN
cvss4_vuldb_acLLLL
cvss4_vuldb_prNNNN
cvss4_vuldb_uiPPPP
cvss4_vuldb_vcNNNN
cvss4_vuldb_viNNNN
cvss4_vuldb_vaLLLL
cvss2_vuldb_eNDNDNDND
cvss3_vuldb_eXXXX
cvss4_vuldb_atNNNN
cvss4_vuldb_scNNNN
cvss4_vuldb_siNNNN
cvss4_vuldb_saNNNN
cvss4_vuldb_eXXXX
cvss2_vuldb_basescore5.05.05.05.0
cvss2_vuldb_tempscore4.44.44.44.4
cvss3_vuldb_basescore4.34.34.34.3
cvss3_vuldb_tempscore4.14.14.14.1
cvss3_meta_basescore4.34.34.34.3
cvss3_meta_tempscore4.14.14.24.2
cvss4_vuldb_bscore5.35.35.35.3
cvss4_vuldb_btscore5.35.35.35.3
advisory_date1752184800 (07/11/2025)1752184800 (07/11/2025)1752184800 (07/11/2025)1752184800 (07/11/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
euvd_idEUVD-2025-21205EUVD-2025-21205EUVD-2025-21205
cve_nvd_summaryA vulnerability was found in Artifex GhostPDL up to 3989415a5b8e99b9d1b87cc9902bde9b7cdea145. It has been classified as problematic. This affects the function pdf_ferror of the file devices/vector/gdevpdf.c of the component New Output File Open Error Handler. The manipulation leads to null pointer dereference. It is possible to initiate the attack remotely. The identifier of the patch is 619a106ba4c4abed95110f84d5efcd7aee38c7cb. It is recommended to apply a patch to fix this issue.A vulnerability was found in Artifex GhostPDL up to 3989415a5b8e99b9d1b87cc9902bde9b7cdea145. It has been classified as problematic. This affects the function pdf_ferror of the file devices/vector/gdevpdf.c of the component New Output File Open Error Handler. The manipulation leads to null pointer dereference. It is possible to initiate the attack remotely. The identifier of the patch is 619a106ba4c4abed95110f84d5efcd7aee38c7cb. It is recommended to apply a patch to fix this issue.
cvss4_cna_avNN
cvss4_cna_acLL
cvss4_cna_atNN
cvss4_cna_prNN
cvss4_cna_uiPP
cvss4_cna_vcNN
cvss4_cna_viNN
cvss4_cna_vaLL
cvss4_cna_scNN
cvss4_cna_siNN
cvss4_cna_saNN
cvss4_cna_bscore5.35.3
cvss3_cna_avNN
cvss3_cna_acLL
cvss3_cna_prNN
cvss3_cna_uiRR
cvss3_cna_sUU
cvss3_cna_cNN
cvss3_cna_iNN
cvss3_cna_aLL
cvss3_cna_basescore4.34.3
cvss2_cna_avNN
cvss2_cna_acLL
cvss2_cna_auNN
cvss2_cna_ciNN
cvss2_cna_iiNN
cvss2_cna_aiPP
cvss2_cna_basescore55
nessus_id243496
nessus_nameAmazon Linux 2023 : ghostscript, ghostscript-gtk, ghostscript-tools-dvipdf (ALAS2023-2025-1118)

Do you want to use VulDB in your project?

Use the official API to access entries easily!