Executive Summary
Summary | |
---|---|
Title | New enscript packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-654 | First vendor Publication | 2005-01-21 |
Vendor | Debian | Last vendor Modification | 2005-01-21 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Erik Sjölund has discovered several security relevant problems in enscript, a program to convert ASCII text into Postscript and other formats. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CAN-2004-1184 Unsanitised input can cause the execution of arbitrary commands via EPSF pipe support. This has been disabled, also upstream. CAN-2004-1185 Due to missing sanitising of filenames it is possible that a specially crafted filename can cause arbitrary commands to be executed. CAN-2004-1186 Multiple buffer overflows can cause the program to crash. Usually, enscript is only run locally, but since it is executed inside of viewcvs some of the problems mentioned above can easily be turned into a remote vulnerability. For the stable distribution (woody) these problems have been fixed in version 1.6.3-1.3. For the unstable distribution (sid) these problems have been fixed in version 1.6.4-6. We recommend that you upgrade your enscript package. |
Original Source
Url : http://www.debian.org/security/2005/dsa-654 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10808 | |||
Oval ID: | oval:org.mitre.oval:def:10808 | ||
Title: | Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames. | ||
Description: | Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-1185 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11134 | |||
Oval ID: | oval:org.mitre.oval:def:11134 | ||
Title: | Multiple buffer overflows in enscript 1.6.3 allow remote attackers or local users to cause a denial of service (application crash). | ||
Description: | Multiple buffer overflows in enscript 1.6.3 allow remote attackers or local users to cause a denial of service (application crash). | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-1186 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:9658 | |||
Oval ID: | oval:org.mitre.oval:def:9658 | ||
Title: | The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters. | ||
Description: | The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-1184 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2010-05-12 | Name : Mac OS X 10.5.7 Update / Mac OS X Security Update 2009-002 File : nvt/macosx_upd_10_5_7_secupd_2009-002.nasl |
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2009-10-10 | Name : SLES9: Security update for enscript File : nvt/sles9p5011436.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200502-03 (enscript) File : nvt/glsa_200502_03.nasl |
2008-09-04 | Name : FreeBSD Ports: enscript-a4, enscript-letter, enscript-letterdj File : nvt/freebsd_enscript-a4.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 654-1 (enscript) File : nvt/deb_654_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
13156 | GNU Enscript Multiple Unspecified Overflows DoS GNU Escript contains multiple non-descript overflows that may allow an attacker to cause a denial of service condition. No further details have been provided. |
13155 | GNU Enscript Malformed Filename Arbitrary Command Execution GNU Enscript contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when creates specially crafted filenames. It is possible that the flaw may allow the attacker to inject arbitrary code resulting in a loss of integrity. |
13154 | GNU Enscript EPSF Pipe Support Arbitrary Command Execution |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_9867.nasl - Type : ACT_GATHER_INFO |
2009-05-13 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_5_7.nasl - Type : ACT_GATHER_INFO |
2009-05-13 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2009-002.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-68-1.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_72da8af67c7511d98cc5000854d03344.nasl - Type : ACT_GATHER_INFO |
2005-02-22 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2005-040.nasl - Type : ACT_GATHER_INFO |
2005-02-14 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200502-03.nasl - Type : ACT_GATHER_INFO |
2005-02-11 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2005-033.nasl - Type : ACT_GATHER_INFO |
2005-02-02 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2005-039.nasl - Type : ACT_GATHER_INFO |
2005-01-27 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-015.nasl - Type : ACT_GATHER_INFO |
2005-01-27 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-016.nasl - Type : ACT_GATHER_INFO |
2005-01-25 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-654.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:33:48 |
|