CVE-2015-8107
https://notcve.org/view.php?id=CVE-2015-8107
Format string vulnerability in GNU a2ps 4.14 allows remote attackers to execute arbitrary code. La vulnerabilidad de cadena de formato en GNU a2ps 4.14 permite a atacantes remotos ejecutar código arbitrario. • http://seclists.org/oss-sec/2015/q4/284 http://www.securityfocus.com/bid/77595 • CWE-134: Use of Externally-Controlled Format String •
CVE-2001-1593
https://notcve.org/view.php?id=CVE-2001-1593
The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file. La función tempname_ensure en biblioteca lib/routines.h en a2ps versión 4.14 y anteriores, tal y como es usado por la función spy_user y otras posibles funciones, permite a usuarios locales modificar archivos arbitrarios en una ataque de tipo symlink en un archivo temporal. • http://pkgs.fedoraproject.org/cgit/a2ps.git/plain/a2ps-4.13-security.patch http://seclists.org/oss-sec/2014/q1/237 http://seclists.org/oss-sec/2014/q1/253 http://seclists.org/oss-sec/2014/q1/257 http://www.debian.org/security/2014/dsa-2892 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737385 https://bugzilla.redhat.com/show_bug.cgi?id=1060630 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2014-0466
https://notcve.org/view.php?id=CVE-2014-0466
The fixps script in a2ps 4.14 does not use the -dSAFER option when executing gs, which allows context-dependent attackers to delete arbitrary files or execute arbitrary commands via a crafted PostScript file. El script fixps en a2ps 4.14 no utiliza la opción -dSAFER cuando ejecuta gs, lo que permite a atacantes dependientes de contexto eliminar archivos arbitrarios o ejecutar comandos arbitrarios a través de un archivo PostScript. • http://lists.opensuse.org/opensuse-updates/2014-04/msg00021.html http://www.debian.org/security/2014/dsa-2892 http://www.securityfocus.com/bid/66660 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742902 https://security.gentoo.org/glsa/201701-67 •
CVE-2004-1377
https://notcve.org/view.php?id=CVE-2004-1377
The (1) fixps (aka fixps.in) and (2) psmandup (aka psmandup.in) scripts in a2ps before 4.13 allow local users to overwrite arbitrary files via a symlink attack on temporary files. • http://secunia.com/advisories/13641 http://www.gentoo.org/security/en/glsa/glsa-200501-02.xml http://www.securityfocus.com/bid/12108 http://www.securityfocus.com/bid/12109 http://www.vuxml.org/freebsd/9168253c-5a6d-11d9-a9e7-0001020eed82.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18671 https://exchange.xforce.ibmcloud.com/vulnerabilities/18672 •
CVE-2004-1170 – GNU a2ps 4.13 - File Name Command Execution
https://notcve.org/view.php?id=CVE-2004-1170
a2ps 4.13 allows remote attackers to execute arbitrary commands via shell metacharacters in the filename. • https://www.exploit-db.com/exploits/24406 http://archives.neohapsis.com/archives/fulldisclosure/2004-08/1026.html http://bugs.debian.org/283134 http://marc.info/?l=bugtraq&m=110598355226660&w=2 http://secunia.com/advisories/12375 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57649-1&searchclause= http://www.mandriva.com/security/advisories?name=MDKSA-2004:140 http://www.novell.com/linux/security/advisories/2004_34_xfree86_libs_xshared.html http://www.securiteam.com •