Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-5864

Опубликовано: 11 нояб. 2006
Источник: ubuntu
Приоритет: untriaged
EPSS Средний
CVSS2: 5.1

Описание

Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers. NOTE: this issue can be exploited through other products that use gv such as evince.

РелизСтатусПримечание
dapper

released

0.5.2-0ubuntu3.2
devel

released

0.8.1-0ubuntu1
edgy

released

0.6.1-0ubuntu1.2
feisty

released

0.8.1-0ubuntu1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

0.5.2-0ubuntu2.1
devel

DNE

edgy

released

0.5.2-0ubuntu4.1
feisty

released

0.5.2-0ubuntu7
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

3.6.1-12ubuntu0.2
devel

released

3.6.2-3ubuntu1
edgy

released

3.6.1-13ubuntu0.2
feisty

released

3.6.2-3ubuntu1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 96%
0.27997
Средний

5.1 Medium

CVSS2

Связанные уязвимости

redhat
больше 18 лет назад

Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers. NOTE: this issue can be exploited through other products that use gv such as evince.

nvd
почти 19 лет назад

Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers. NOTE: this issue can be exploited through other products that use gv such as evince.

debian
почти 19 лет назад

Stack-based buffer overflow in the ps_gettext function in ps.c for GNU ...

github
больше 3 лет назад

Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers. NOTE: this issue can be exploited through other products that use gv such as evince.

fstec
почти 19 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 96%
0.27997
Средний

5.1 Medium

CVSS2