Lucene search

K
osvGoogleOSV:DSA-1670-1
HistoryNov 24, 2008 - 12:00 a.m.

enscript - arbitrary code execution

2008-11-2400:00:00
Google
osv.dev
8

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.303 Low

EPSS

Percentile

96.3%

Several vulnerabilities have been discovered in Enscript, a converter
from ASCII text to Postscript, HTML or RTF. The Common Vulnerabilities
and Exposures project identifies the following problems:

  • CVE-2008-3863
    Ulf Harnhammer discovered that a buffer overflow may lead to
    the execution of arbitrary code.
  • CVE-2008-4306
    Kees Cook and Tomas Hoger discovered that several buffer
    overflows may lead to the execution of arbitrary code.

For the stable distribution (etch), these problems have been fixed in
version 1.6.4-11.1.

For the upcoming stable distribution (lenny) and the unstable
distribution (sid), these problems have been fixed in version 1.6.4-13.

We recommend that you upgrade your enscript package.

CPENameOperatorVersion
enscripteq1.6.4-11

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.303 Low

EPSS

Percentile

96.3%