Computer Security
[EN] securityvulns.ru no-pyccku


GNU enscript buffer overflow
Published:29.10.2008
Source:
SecurityVulns ID:9389
Type:local
Threat Level:
5/10
Description:Buffer overflow on text file conversion.
Affected:GNU : enscript 1.6
CVE:CVE-2008-3863 (Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.)
Original documentdocumentSECUNIA, Secunia Research: GNU Enscript "setfilename" Special Escape Buffer Overflow (29.10.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod