7.6 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.055 Low
EPSS
Percentile
93.2%
Multiple buffer overflows in abcm2ps before 5.9.12 might allow remote attackers to execute arbitrary code via (1) a crafted input file, related to the PUT0 and PUT1 output macros; (2) a crafted input file, related to the trim_title function; and possibly (3) a long -O option on a command line.
CPE | Name | Operator | Version |
---|---|---|---|
moinejf:abcm2ps | moinejf abcm2ps | lt | 5.9.12 |
fedoraproject:fedora | fedoraproject fedora | eq | 14 |
bugs.debian.org/cgi-bin/bugreport.cgi?bug=577014
lists.fedoraproject.org/pipermail/package-announce/2011-February/054015.html
moinejf.free.fr/abcm2ps-5.txt
secunia.com/advisories/39345
secunia.com/advisories/43338
www.openwall.com/lists/oss-security/2010/04/08/5
www.openwall.com/lists/oss-security/2010/04/08/6
www.openwall.com/lists/oss-security/2010/04/08/7
www.securityfocus.com/bid/39271
www.vupen.com/english/advisories/2011/0390
bugzilla.redhat.com/show_bug.cgi?id=580435