CVE-2006-5864
Evince Document Viewer - 'DocumentMedia' Remote Buffer Overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers. NOTE: this issue can be exploited through other products that use gv such as evince.
Desbordamiento de búfer basado en pila en la función ps_gettext en ps.c para GNU gv 3.6.2, y posiblemente versiones anteriores, permite a atacantes con la intervención del usuario ejecutar código de su elección mediante un fichero PostScript (PS) con determinadas cabeceras que contienen comentarios largos, como se ha demostrado usando las cabeceras (1) DocumentMedia, (2) DocumentPaperSizes, y posiblemente (3) PageMedia y (4) PaperSize. NOTA: este problema puede ser explotado a través de otros productos que utilicen gv tales como evince.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-11-10 CVE Reserved
- 2006-11-11 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (39)
URL | Tag | Source |
---|---|---|
http://www.kb.cert.org/vuls/id/352825 | Third Party Advisory |
|
http://www.securityfocus.com/archive/1/451057/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/451422/100/200/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/452868/100/0/threaded | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30153 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30555 | Vdb Entry | |
https://issues.rpath.com/browse/RPL-850 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/2858 | 2024-08-07 | |
http://www.securityfocus.com/bid/20978 | 2024-08-07 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gnu Search vendor "Gnu" | Gv Search vendor "Gnu" for product "Gv" | 3.5.8 Search vendor "Gnu" for product "Gv" and version "3.5.8" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Gv Search vendor "Gnu" for product "Gv" | 3.6.0 Search vendor "Gnu" for product "Gv" and version "3.6.0" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Gv Search vendor "Gnu" for product "Gv" | 3.6.1 Search vendor "Gnu" for product "Gv" and version "3.6.1" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Gv Search vendor "Gnu" for product "Gv" | 3.6.2 Search vendor "Gnu" for product "Gv" and version "3.6.2" | - |
Affected
|