Multiple buffer overflows in abcm2ps before 5.9.12 might allow remote attackers to execute arbitrary code via (1) a crafted input file, related to the PUT0 and PUT1 output macros; (2) a crafted input file, related to the trim_title function; and possibly (3) a long -O option on a command line.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=577014
lists.fedoraproject.org/pipermail/package-announce/2011-February/054015.html
moinejf.free.fr/abcm2ps-5.txt
secunia.com/advisories/39345
secunia.com/advisories/43338
www.openwall.com/lists/oss-security/2010/04/08/5
www.openwall.com/lists/oss-security/2010/04/08/6
www.openwall.com/lists/oss-security/2010/04/08/7
www.securityfocus.com/bid/39271
www.vupen.com/english/advisories/2011/0390
bugzilla.redhat.com/show_bug.cgi?id=580435