Artifex Ghostscript, UTF-8 Encoding Mishandling, CVE-2025-46646 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-46646 is a vulnerability in Artifex Ghostscript before version 10.05.0, where the `decode_utf8` function in `base/gp_utf8.c` fails to properly handle overlong UTF-8 encodings. This flaw stems from an incomplete fix for CVE-2024-46954. Attackers can exploit this by crafting malicious UTF-8 sequences that bypass validation, leading to memory corruption, arbitrary code execution, or denial of service. The improper parsing of overlong encodings allows invalid byte sequences to trigger undefined behavior in the interpreter.

DailyCVE Form

Platform: Artifex Ghostscript
Version: < 10.05.0
Vulnerability: UTF-8 mishandling
Severity: Critical
Date: 06/23/2025

Prediction: Patch expected by 08/2025

What Undercode Say

Check Ghostscript version
gs --version
Debug UTF-8 parsing
strace -e trace=file gs -dSAFER -sDEVICE=nullpage
Sample malicious UTF-8 payload
echo -e "\xFC\x80\x80\x80\x80\x80" > exploit.ps

How Exploit

Craft a PostScript file with overlong UTF-8 sequences to trigger memory corruption. Use heap grooming to redirect execution flow.

Protection from this CVE

Update to Ghostscript 10.05.0+. Enable `-dSAFER` mode. Filter untrusted PostScript inputs.

Impact

Remote code execution, system compromise, or service crash. Critical for shared rendering services.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top