Описание
Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1.6.4-7ubuntu0.2 |
devel | not-affected | |
gutsy | released | 1.6.4-11ubuntu0.2 |
hardy | released | 1.6.4-12ubuntu0.8.04.1 |
intrepid | released | 1.6.4-12ubuntu0.8.10.1 |
upstream | released | 1.6.4-13 |
Показывать по
EPSS
7.6 High
CVSS2
Связанные уязвимости
Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.
Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.
Stack-based buffer overflow in the read_special_escape function in src ...
Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.
EPSS
7.6 High
CVSS2