CVE-2008-4306
enscript: "font" special escape buffer overflows
Severity Score
9.8
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Buffer overflow in enscript before 1.6.4 has unknown impact and attack vectors, possibly related to the font escape sequence.
Vulnerabilidad inespecífica en enscript antes de la v1.6.4 en Ubuntu Linux v6.06 LTS, v7.10, v8.04 y v8.10 que tiene un impacto y unos vectores de ataque desconocidos, posiblemente este relacionado con el desbordamiento de búfer.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2008-09-29 CVE Reserved
- 2008-11-04 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (23)
URL | Tag | Source |
---|---|---|
http://osvdb.org/49569 | Vdb Entry | |
http://secunia.com/advisories/32521 | Third Party Advisory | |
http://secunia.com/advisories/32753 | Third Party Advisory | |
http://secunia.com/advisories/32854 | Third Party Advisory | |
http://secunia.com/advisories/32970 | Third Party Advisory | |
http://secunia.com/advisories/33109 | Third Party Advisory | |
http://support.avaya.com/elmodocs2/security/ASA-2008-504.htm | X_refsource_confirm | |
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0321 | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/498385/100/0/threaded | Mailing List | |
https://issues.rpath.com/browse/RPL-2887 | X_refsource_confirm | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10718 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ubuntu Search vendor "Ubuntu" | Linux Search vendor "Ubuntu" for product "Linux" | 6.06 Search vendor "Ubuntu" for product "Linux" and version "6.06" | lts |
Affected
| ||||||
Ubuntu Search vendor "Ubuntu" | Linux Search vendor "Ubuntu" for product "Linux" | 7.10 Search vendor "Ubuntu" for product "Linux" and version "7.10" | - |
Affected
| ||||||
Ubuntu Search vendor "Ubuntu" | Linux Search vendor "Ubuntu" for product "Linux" | 8.04 Search vendor "Ubuntu" for product "Linux" and version "8.04" | lts |
Affected
| ||||||
Ubuntu Search vendor "Ubuntu" | Linux Search vendor "Ubuntu" for product "Linux" | 8.10 Search vendor "Ubuntu" for product "Linux" and version "8.10" | - |
Affected
|