Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2008-3863

Опубликовано: 23 окт. 2008
Источник: nvd
CVSS2: 7.6
EPSS Средний

Описание

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:gnu:enscript:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:enscript:1.6.4:beta:*:*:*:*:*:*

EPSS

Процентиль: 95%
0.19754
Средний

7.6 High

CVSS2

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 17 лет назад

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.

redhat
почти 17 лет назад

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.

debian
почти 17 лет назад

Stack-based buffer overflow in the read_special_escape function in src ...

github
больше 3 лет назад

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.

oracle-oval
больше 16 лет назад

ELSA-2008-1016: enscript security update (MODERATE)

EPSS

Процентиль: 95%
0.19754
Средний

7.6 High

CVSS2

Дефекты

CWE-119