7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.006 Low
EPSS
Percentile
78.9%
Severity: High
Date : 2020-05-06
CVE-ID : CVE-2014-0466 CVE-2015-8107
Package : a2ps
Type : multiple issues
Remote : No
Link : https://security.archlinux.org/AVG-1150
The package a2ps before version 4.14-9 is vulnerable to multiple issues
including arbitrary command execution and arbitrary code execution.
Upgrade to 4.14-9.
The problems have been fixed upstream but no release is available yet.
None.
The fixps script in a2ps 4.14 does not use the -dSAFER option when
executing gs, which allows context-dependent attackers to delete
arbitrary files or execute arbitrary commands via a crafted PostScript
file.
A format string vulnerability in GNU a2ps 4.14 allows remote attackers
to execute arbitrary code.
A remote attacker can send crafted Postscript files which can execute
arbitrary commands or delete files from the system.
https://github.com/akimd/a2ps/commit/5ea5ff8bc0094ca1eda0dd0e011d860e994c0a88
https://github.com/akimd/a2ps/commit/90b876cb480ca9e092490c825663f23909c6173c
https://security.archlinux.org/CVE-2014-0466
https://security.archlinux.org/CVE-2015-8107
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.006 Low
EPSS
Percentile
78.9%