Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2008-4306 | First vendor Publication | 2008-11-04 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Buffer overflow in enscript before 1.6.4 has unknown impact and attack vectors, possibly related to the font escape sequence. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10718 | |||
Oval ID: | oval:org.mitre.oval:def:10718 | ||
Title: | Buffer overflow in enscript before 1.6.4 has unknown impact and attack vectors, possibly related to the font escape sequence. | ||
Description: | Buffer overflow in enscript before 1.6.4 has unknown impact and attack vectors, possibly related to the font escape sequence. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-4306 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16828 | |||
Oval ID: | oval:org.mitre.oval:def:16828 | ||
Title: | USN-660-1 -- enscript vulnerability | ||
Description: | Ulf HE4rnhammar discovered multiple stack overflows in enscript's handling of special escape arguments. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-660-1 CVE-2008-3863 CVE-2008-4306 | Version: | 7 |
Platform(s): | Ubuntu 6.06 Ubuntu 7.10 Ubuntu 8.04 Ubuntu 8.10 | Product(s): | enscript |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18482 | |||
Oval ID: | oval:org.mitre.oval:def:18482 | ||
Title: | DSA-1670-1 enscript - arbitrary code execution | ||
Description: | Several vulnerabilities have been discovered in Enscript, a converter from ASCII text to Postscript, HTML or RTF. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1670-1 CVE-2008-3863 CVE-2008-4306 | Version: | 7 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | enscript |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21904 | |||
Oval ID: | oval:org.mitre.oval:def:21904 | ||
Title: | ELSA-2008:1016: enscript security update (Moderate) | ||
Description: | Buffer overflow in enscript before 1.6.4 has unknown impact and attack vectors, possibly related to the font escape sequence. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2008:1016-01 CVE-2008-3863 CVE-2008-4306 | Version: | 13 |
Platform(s): | Oracle Linux 5 | Product(s): | enscript |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28976 | |||
Oval ID: | oval:org.mitre.oval:def:28976 | ||
Title: | RHSA-2008:1016 -- enscript security update (Moderate) | ||
Description: | An updated enscript packages that fixes several security issues is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. GNU enscript converts ASCII files to PostScript(R) language files and spools the generated output to a specified printer or saves it to a file. Enscript can be extended to handle different output media and includes options for customizing printouts. Two buffer overflow flaws were found in GNU enscript. An attacker could craft an ASCII file in such a way that it could execute arbitrary commands if the file was opened with enscript with the special escapes option (-e or --escapes) enabled. (CVE-2008-3863, CVE-2008-4306) | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2008:1016 CESA-2008:1016-CentOS 5 CVE-2008-3863 CVE-2008-4306 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | enscript |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:7926 | |||
Oval ID: | oval:org.mitre.oval:def:7926 | ||
Title: | DSA-1670 enscript -- buffer overflows | ||
Description: | Several vulnerabilities have been discovered in Enscript, a converter from ASCII text to Postscript, HTML or RTF. The Common Vulnerabilities and Exposures project identifies the following problems: Ulf Harnhammer discovered that a buffer overflow may lead to the execution of arbitrary code. Kees Cook and Tomas Hoger discovered that several buffer overflows may lead to the execution of arbitrary code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1670 CVE-2008-3863 CVE-2008-4306 | Version: | 3 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | enscript |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 4 |
OpenVAS Exploits
Date | Description |
---|---|
2009-04-09 | Name : Mandriva Update for enscript MDVSA-2008:243 (enscript) File : nvt/gb_mandriva_MDVSA_2008_243.nasl |
2009-03-23 | Name : Ubuntu Update for enscript vulnerability USN-660-1 File : nvt/gb_ubuntu_USN_660_1.nasl |
2009-03-06 | Name : RedHat Update for enscript RHSA-2008:1016-01 File : nvt/gb_RHSA-2008_1016-01_enscript.nasl |
2009-03-06 | Name : RedHat Update for enscript RHSA-2008:1021-02 File : nvt/gb_RHSA-2008_1021-02_enscript.nasl |
2009-02-27 | Name : CentOS Update for enscript CESA-2008:1021-02 centos2 i386 File : nvt/gb_CESA-2008_1021-02_enscript_centos2_i386.nasl |
2009-02-27 | Name : CentOS Update for enscript CESA-2008:1021 centos3 i386 File : nvt/gb_CESA-2008_1021_enscript_centos3_i386.nasl |
2009-02-27 | Name : CentOS Update for enscript CESA-2008:1021 centos3 x86_64 File : nvt/gb_CESA-2008_1021_enscript_centos3_x86_64.nasl |
2009-02-27 | Name : CentOS Update for enscript CESA-2008:1021 centos4 i386 File : nvt/gb_CESA-2008_1021_enscript_centos4_i386.nasl |
2009-02-27 | Name : CentOS Update for enscript CESA-2008:1021 centos4 x86_64 File : nvt/gb_CESA-2008_1021_enscript_centos4_x86_64.nasl |
2009-02-17 | Name : Fedora Update for enscript FEDORA-2008-9351 File : nvt/gb_fedora_2008_9351_enscript_fc8.nasl |
2009-02-17 | Name : Fedora Update for enscript FEDORA-2008-9372 File : nvt/gb_fedora_2008_9372_enscript_fc9.nasl |
2008-12-03 | Name : Debian Security Advisory DSA 1670-1 (enscript) File : nvt/deb_1670_1.nasl |
2008-12-03 | Name : Gentoo Security Advisory GLSA 200812-02 (enscript) File : nvt/glsa_200812_02.nasl |
2008-11-24 | Name : FreeBSD Ports: enscript-a4, enscript-letter, enscript-letterdj File : nvt/freebsd_enscript-a40.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
49569 | Enscript on Ubuntu Unspecified Issue |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2008-1016.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2008-1021.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20081215_enscript_on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2010-01-06 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2008-1016.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2008-243.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-660-1.nasl - Type : ACT_GATHER_INFO |
2008-12-16 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2008-1021.nasl - Type : ACT_GATHER_INFO |
2008-12-16 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2008-1016.nasl - Type : ACT_GATHER_INFO |
2008-12-16 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2008-1021.nasl - Type : ACT_GATHER_INFO |
2008-12-03 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200812-02.nasl - Type : ACT_GATHER_INFO |
2008-11-25 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1670.nasl - Type : ACT_GATHER_INFO |
2008-11-19 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_a1126054b57c11dd88920017319806e7.nasl - Type : ACT_GATHER_INFO |
2008-11-06 | Name : The remote Fedora host is missing a security update. File : fedora_2008-9351.nasl - Type : ACT_GATHER_INFO |
2008-11-06 | Name : The remote Fedora host is missing a security update. File : fedora_2008-9372.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:13:05 |
|
2024-11-28 12:16:36 |
|
2021-05-04 12:08:07 |
|
2021-04-22 01:08:28 |
|
2020-05-23 00:22:19 |
|
2018-10-12 00:20:28 |
|
2017-09-29 09:23:44 |
|
2016-06-28 17:18:36 |
|
2016-04-26 17:51:52 |
|
2014-02-17 10:46:47 |
|
2013-05-11 00:27:09 |
|
2012-11-07 00:18:14 |
|