Lucene search

K
freebsdFreeBSDA1126054-B57C-11DD-8892-0017319806E7
HistoryOct 22, 2008 - 12:00 a.m.

enscript -- arbitrary code execution vulnerability

2008-10-2200:00:00
vuxml.freebsd.org
12

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.292 Low

EPSS

Percentile

96.9%

Ulf Harnhammar of Secunia Research reports:

Stack-based buffer overflow in the read_special_escape function
in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e
(aka special escapes processing) option is enabled, allows
user-assisted remote attackers to execute arbitrary code via a
crafted ASCII file, related to the setfilename command.

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.292 Low

EPSS

Percentile

96.9%