CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
94.8%
Multiple buffer overflows in abcm2ps before 5.9.12 might allow remote attackers to execute arbitrary code via (1) a crafted input file, related to the PUT0 and PUT1 output macros; (2) a crafted input file, related to the trim_title function; and possibly (3) a long -O option on a command line.
Vendor | Product | Version | CPE |
---|---|---|---|
moinejf | abcm2ps | * | cpe:2.3:a:moinejf:abcm2ps:*:*:*:*:*:*:*:* |
fedoraproject | fedora | 14 | cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:* |
bugs.debian.org/cgi-bin/bugreport.cgi?bug=577014
lists.fedoraproject.org/pipermail/package-announce/2011-February/054015.html
moinejf.free.fr/abcm2ps-5.txt
secunia.com/advisories/39345
secunia.com/advisories/43338
www.openwall.com/lists/oss-security/2010/04/08/5
www.openwall.com/lists/oss-security/2010/04/08/6
www.openwall.com/lists/oss-security/2010/04/08/7
www.securityfocus.com/bid/39271
www.vupen.com/english/advisories/2011/0390
bugzilla.redhat.com/show_bug.cgi?id=580435