FreeBSD : enscript -- arbitrary code execution vulnerability (a1126054-b57c-11dd-8892-0017319806e7)

high Nessus Plugin ID 34817

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Ulf Harnhammar of Secunia Research reports :

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.

Solution

Update the affected packages.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2008-41/

http://www.nessus.org/u?49efcf97

Plugin Details

Severity: High

ID: 34817

File Name: freebsd_pkg_a1126054b57c11dd88920017319806e7.nasl

Version: 1.16

Type: local

Published: 11/19/2008

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:enscript-a4, p-cpe:/a:freebsd:freebsd:enscript-letter, p-cpe:/a:freebsd:freebsd:enscript-letterdj, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 11/18/2008

Vulnerability Publication Date: 10/22/2008

Reference Information

CVE: CVE-2008-3863, CVE-2008-4306

CWE: 119