CVE-2025-7462
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-12

Last updated on: 2025-11-03

Assigner: VulDB

Description
A vulnerability was found in Artifex GhostPDL up to 3989415a5b8e99b9d1b87cc9902bde9b7cdea145. It has been classified as problematic. This affects the function pdf_ferror of the file devices/vector/gdevpdf.c of the component New Output File Open Error Handler. The manipulation leads to null pointer dereference. It is possible to initiate the attack remotely. The identifier of the patch is 619a106ba4c4abed95110f84d5efcd7aee38c7cb. It is recommended to apply a patch to fix this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-12
Last Modified
2025-11-03
Generated
2026-05-07
AI Q&A
2025-07-12
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
artifex ghostpdl *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-404 The product does not release or incorrectly releases a resource before it is made available for re-use.
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Artifex GhostPDL in the function pdf_ferror within the file devices/vector/gdevpdf.c. It involves a null pointer dereference caused by improper handling in the New Output File Open Error Handler component. An attacker can remotely initiate this issue, potentially causing the program to crash or behave unexpectedly.


How can this vulnerability impact me? :

The vulnerability can lead to a null pointer dereference, which may cause the affected software to crash or become unstable. Since the attack can be initiated remotely, it could result in denial of service or disruption of service availability.


What immediate steps should I take to mitigate this vulnerability?

It is recommended to apply the patch identified by commit 619a106ba4c4abed95110f84d5efcd7aee38c7cb to fix this issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart