FreeBSD : enscript -- arbitrary code execution vulnerability (a1126054-b57c-11dd-8892-0017319806e7)

high Nessus Plugin ID 34817


The remote FreeBSD host is missing one or more security-related updates.


Ulf Harnhammar of Secunia Research reports :

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 34817

File Name: freebsd_pkg_a1126054b57c11dd88920017319806e7.nasl

Version: 1.16

Type: local

Published: 11/19/2008

Updated: 1/6/2021

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:enscript-a4, p-cpe:/a:freebsd:freebsd:enscript-letter, p-cpe:/a:freebsd:freebsd:enscript-letterdj, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 11/18/2008

Vulnerability Publication Date: 10/22/2008

Reference Information

CVE: CVE-2008-3863, CVE-2008-4306

CWE: 119