GLSA Bodhisattva
Joined: 25 Feb 2003 Posts: 3829 Location: Essen, Germany
|
Posted: Wed Feb 02, 2005 1:41 pm Post subject: [ GLSA 200502-03 ] enscript: Multiple vulnerabilities |
|
|
Gentoo Linux Security Advisory
Title: enscript: Multiple vulnerabilities (GLSA 200502-03)
Severity: normal
Exploitable: remote
Date: February 02, 2005
Bug(s): #77408
ID: 200502-03
Synopsis
enscript suffers from vulnerabilities and design flaws, potentially resulting in the execution of arbitrary code.
Background
enscript is a powerful ASCII to PostScript file converter.
Affected Packages
Package: app-text/enscript
Vulnerable: < 1.6.3-r3
Unaffected: >= 1.6.3-r3
Architectures: All supported architectures
Description
Erik Sjolund discovered several issues in enscript: it suffers from several buffer overflows (CAN-2004-1186), quotes and shell escape characters are insufficiently sanitized in filenames (CAN-2004-1185), and it supported taking input from an arbitrary command pipe, with unwanted side effects (CAN-2004-1184).
Impact
An attacker could design malicious files or input data which, once feeded into enscript, would trigger the execution of arbitrary code with the rights of the user running enscript.
Workaround
There is no known workaround at this time.
Resolution
All enscript users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/enscript-1.6.3-r3" |
References
CAN-2004-1184
CAN-2004-1185
CAN-2004-1186
Last edited by GLSA on Sun May 07, 2006 4:55 pm; edited 1 time in total |
|