Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-3863

Опубликовано: 22 окт. 2008
Источник: redhat
CVSS2: 4.4
EPSS Средний

Описание

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=466771enscript: "setfilename" special escape buffer overflow

EPSS

Процентиль: 95%
0.19754
Средний

4.4 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 17 лет назад

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.

nvd
почти 17 лет назад

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.

debian
почти 17 лет назад

Stack-based buffer overflow in the read_special_escape function in src ...

github
больше 3 лет назад

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.

oracle-oval
больше 16 лет назад

ELSA-2008-1016: enscript security update (MODERATE)

EPSS

Процентиль: 95%
0.19754
Средний

4.4 Medium

CVSS2