FreeBSD : enscript -- arbitrary code execution vulnerability (a1126054-b57c-11dd-8892-0017319806e7)

High Nessus Plugin ID 34817


The remote FreeBSD host is missing one or more security-related updates.


Ulf Harnhammar of Secunia Research reports :

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 34817

File Name: freebsd_pkg_a1126054b57c11dd88920017319806e7.nasl

Version: $Revision: 1.12 $

Type: local

Published: 2008/11/19

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:enscript-a4, p-cpe:/a:freebsd:freebsd:enscript-letter, p-cpe:/a:freebsd:freebsd:enscript-letterdj, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2008/11/18

Vulnerability Publication Date: 2008/10/22

Reference Information

CVE: CVE-2008-3863, CVE-2008-4306

CWE: 119