5 results (0.017 seconds)

CVSS: 7.6EPSS: 33%CPEs: 2EXPL: 0

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command. Desbordamiento de búfer basado en la función read_special_escape en src/psgen.c en GNU Enscript 1.6.1 y 1.6.4 beta, cuando la opción -e (también conocido como procesado de escapados especiales) está habilitado, permite a atacantes remotos ayudados por el usuario ejecutar código de su elección mediante un archivo ASCII manipulado, relacionado con el comando setfilename. • http://lists.apple.com/archives/security-announce/2009/May/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html http://rhn.redhat.com/errata/RHSA-2008-1021.html http://secunia.com/advisories/32137 http://secunia.com/advisories/32521 http://secunia.com/advisories/32530 http://secunia.com/advisories/32753 http://secunia.com/advisories/32854 http://secunia.com/advisories/32970 http://secunia.com/advisories/33109 http://secunia.com/advisories/35074 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 0

Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames. • http://lists.apple.com/archives/security-announce/2009/May/msg00002.html http://secunia.com/advisories/35074 http://securitytracker.com/id?1012965 http://support.apple.com/kb/HT3549 http://www.debian.org/security/2005/dsa-654 http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:033 http://www.redhat.com/support/errata/RHSA-2005-040.html http://www.securityfocus.com/archive/1/419768/100/0/threaded http: •

CVSS: 4.6EPSS: 0%CPEs: 59EXPL: 0

The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters. • http://lists.apple.com/archives/security-announce/2009/May/msg00002.html http://secunia.com/advisories/35074 http://securitytracker.com/id?1012965 http://support.apple.com/kb/HT3549 http://www.debian.org/security/2005/dsa-654 http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:033 http://www.redhat.com/support/errata/RHSA-2005-040.html http://www.securityfocus.com/archive/1/419768/100/0/threaded http: •

CVSS: 5.0EPSS: 4%CPEs: 1EXPL: 0

Multiple buffer overflows in enscript 1.6.3 allow remote attackers or local users to cause a denial of service (application crash). • http://lists.apple.com/archives/security-announce/2009/May/msg00002.html http://secunia.com/advisories/35074 http://securitytracker.com/id?1012965 http://support.apple.com/kb/HT3549 http://www.debian.org/security/2005/dsa-654 http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:033 http://www.redhat.com/support/errata/RHSA-2005-040.html http://www.securityfocus.com/archive/1/419768/100/0/threaded http: •

CVSS: 3.6EPSS: 0%CPEs: 8EXPL: 0

GNU Enscript 1.6.1 and earlier allows local users to overwrite arbitrary files of the Enscript user via a symlink attack on temporary files. Enscript 1.5.1 y anteriores permiten a usaurios locales sobreescribir ficheros arbitrarios del usuario Enscript mediante un ataque de enlaces simbólicos (symlink attack) en ficheros temporales. • http://www.debian.org/security/2002/dsa-105 http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-010.php3 http://www.redhat.com/support/errata/RHSA-2002-012.html http://www.securityfocus.com/advisories/3818 http://www.securityfocus.com/bid/3920 https://exchange.xforce.ibmcloud.com/vulnerabilities/7932 •