- Description
- Artifex Ghostscript through 10.05.1 has a stack-based buffer overflow in pdf_write_cmap in devices/vector/gdevpdtw.c.
- Source
- cve@mitre.org
- NVD status
- Modified
- Products
- ghostscript
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
- cve@mitre.org
- CWE-121
- Hype score
- Not currently trending
๐จ CRITICAL UPDATE: #Fedora 42 Ghostscript security patch released for CVE-2025-59798, CVE-2025-59799, CVE-2025-59800 Read more: ๐ท https://t.co/rAk4ATCFvD #Security https://t.co/mWLOxMWJ6G
@Cezar_H_Linux
28 Jan 2026
36 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
New #Ubuntu Security Notice: USN-7904-1 addresses CVE-2025-59798/9 in Ghostscript. The flaw in file writing logic could lead to a service crash (Denial of Service). Read more: ๐ https://t.co/yVn93IwVai #Security https://t.co/sHCQMtTt2f
@Cezar_H_Linux
3 Dec 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
openSUSE ships Ghostscript fixes for CVE-2025-59798/59799, stack-based overflows in PDF handling. Patch via zypper/YaST and move on with your day. #Linux https://t.co/XEQMSxLcYM
@threatcluster
20 Nov 2025
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐จ URGENT: #openSUSE Ghostscript security patches released for CVE-2025-59798 and CVE-2025-59799 Read more: ๐ https://t.co/Gr2eeNRT6N #Security https://t.co/6uMAmjCGvf
@Cezar_H_Linux
20 Nov 2025
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-59798 Artifex Ghostscript through 10.05.1 has a stack-based buffer overflow in pdf_write_cmap in devices/vector/gdevpdtw.c. https://t.co/U9YnKfZWZa
@CVEnew
22 Sept 2025
488 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5BA5204-8B09-447B-9E75-64878DF9B41D",
"versionEndIncluding": "10.05.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]