Debian DSA-1214-2 : gv - buffer overflow

medium Nessus Plugin ID 23700

Synopsis

The remote Debian host is missing a security-related update.

Description

The original update provided in DSA 1214-1 was insufficient; this update corrects this. For reference please find the original advisory text below :

Renaud Lifchitz discovered that gv, the PostScript and PDF viewer for X, performs insufficient boundary checks in the Postscript parsing code, which allows the execution of arbitrary code through a buffer overflow.

Solution

Upgrade the gv package.

For the stable distribution (sarge) this problem has been fixed in version 3.6.1-10sarge2.

For the upcoming stable distribution (etch) this problem has been fixed in version 3.6.2-2.

See Also

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398292

http://www.debian.org/security/2006/dsa-1214

Plugin Details

Severity: Medium

ID: 23700

File Name: debian_DSA-1214.nasl

Version: 1.18

Type: local

Agent: unix

Published: 11/22/2006

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:gv, cpe:/o:debian:debian_linux:3.1

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 11/10/2006

Exploitable With

Core Impact

Reference Information

CVE: CVE-2006-5864

DSA: 1214