
Cloud Vulnerability DB
A community-led vulnerabilities database
In Artifex GhostXPS before version 10.06.0, a stack-based buffer overflow vulnerability (CVE-2025-59801) was discovered in the xpsunpredicttiff function within xpstiff.c. The vulnerability exists because the samplesperpixel value is not properly validated before being used, allowing potential buffer overflow conditions (GhostScript Bug).
The vulnerability occurs in the xpsunpredicttiff function where the samplesperpixel parameter is passed without proper bounds checking. This leads to a stack-based buffer overflow condition when processing TIFF files within XPS documents. The issue has been assigned a CVSS v3.1 score of 4.3 MEDIUM (Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N) and is classified under CWE-121 (Stack-based Buffer Overflow) (GhostScript Bug, NVD).
The vulnerability could allow an attacker to cause a buffer overflow condition, potentially leading to arbitrary code execution. While the bug itself cannot achieve remote code execution in isolation on systems with modern security protections (ASLR and stack canaries), it could be chained with other vulnerabilities to achieve code execution (GhostScript Bug).
The vulnerability has been patched in GhostXPS version 10.06.0. The fix involves implementing proper validation of the samplesperpixel value. Users are advised to upgrade to this version or later to mitigate the vulnerability (GhostScript Bug).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."