Search for vulnerabilities
Vulnerability details: VCID-h8u5-p2zz-akcz
Vulnerability ID VCID-h8u5-p2zz-akcz
Aliases CVE-2023-38559
Summary A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.
Status Published
Exploitability 0.5
Weighted Severity 5.0
Risk 2.5
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
cvssv3 5.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38559.json
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2023-38559
cvssv3.1 3.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.5 https://nvd.nist.gov/vuln/detail/CVE-2023-38559
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38559.json
https://access.redhat.com/security/cve/CVE-2023-38559
https://api.first.org/data/v1/epss?cve=CVE-2023-38559
https://bugs.ghostscript.com/show_bug.cgi?id=706897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38559
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1
https://lists.debian.org/debian-lts-announce/2023/08/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GBV6BTUREXM6DB3OGHGLMWGAZ3I45TXE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QH7ERAYSSXEYDWWY7LOV7CA5MIDZN3Z6/
1043033 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043033
2224367 https://bugzilla.redhat.com/show_bug.cgi?id=2224367
cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
CVE-2023-38559 https://nvd.nist.gov/vuln/detail/CVE-2023-38559
RHSA-2023:6544 https://access.redhat.com/errata/RHSA-2023:6544
RHSA-2023:7053 https://access.redhat.com/errata/RHSA-2023:7053
USN-6297-1 https://usn.ubuntu.com/6297-1/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38559.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-38559
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.01309
EPSS Score 0.00013
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:39:52.804767+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/6297-1/ 37.0.0