Mandriva Linux Security Advisory : enscript (MDVSA-2008:243)

high Nessus Plugin ID 36321


The remote Mandriva Linux host is missing a security update.


Two buffer overflow vulnerabilities were discovered in GNU enscript, which could allow an attacker to execute arbitrary commands via a specially crafted ASCII file, if the file were opened with the -e or
--escapes option enabled (CVE-2008-3863, CVE-2008-4306).

The updated packages have been patched to prevent these issues.


Update the affected enscript package.

Plugin Details

Severity: High

ID: 36321

File Name: mandriva_MDVSA-2008-243.nasl

Version: 1.15

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:enscript, cpe:/o:mandriva:linux:2008.0, cpe:/o:mandriva:linux:2008.1, cpe:/o:mandriva:linux:2009.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/15/2008

Reference Information

CVE: CVE-2008-3863, CVE-2008-4306

BID: 31858

MDVSA: 2008:243

CWE: 119