Listen to this Post
How the CVE Works
CVE-2025-46646 is a vulnerability in Artifex Ghostscript before version 10.05.0, where the `decode_utf8` function in `base/gp_utf8.c` fails to properly handle overlong UTF-8 encodings. This flaw stems from an incomplete fix for CVE-2024-46954. Attackers can exploit this by crafting malicious UTF-8 sequences that bypass validation, leading to memory corruption, arbitrary code execution, or denial of service. The improper parsing of overlong encodings allows invalid byte sequences to trigger undefined behavior in the interpreter.
DailyCVE Form
Platform: Artifex Ghostscript
Version: < 10.05.0
Vulnerability: UTF-8 mishandling
Severity: Critical
Date: 06/23/2025
Prediction: Patch expected by 08/2025
What Undercode Say
Check Ghostscript version gs --version Debug UTF-8 parsing strace -e trace=file gs -dSAFER -sDEVICE=nullpage Sample malicious UTF-8 payload echo -e "\xFC\x80\x80\x80\x80\x80" > exploit.ps
How Exploit
Craft a PostScript file with overlong UTF-8 sequences to trigger memory corruption. Use heap grooming to redirect execution flow.
Protection from this CVE
Update to Ghostscript 10.05.0+. Enable `-dSAFER` mode. Filter untrusted PostScript inputs.
Impact
Remote code execution, system compromise, or service crash. Critical for shared rendering services.
Sources:
Reported By: nvd.nist.gov
Extra Source Hub:
Undercode