GNU Enscript 1.6.1

CPE Details

GNU Enscript 1.6.1
1.6.1
2007-08-23
19h16 +00:00
2007-09-14
15h36 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:gnu:enscript:1.6.1:*:*:*:*:*:*:*

Informations

Vendor

gnu

Product

enscript

Version

1.6.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2008-3863 2008-10-23 19h00 +00:00 Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.
7.6
CVE-2004-1184 2005-01-29 04h00 +00:00 The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.
4.6
CVE-2004-1185 2005-01-29 04h00 +00:00 Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames.
7.5
CVE-2002-0044 2002-06-25 02h00 +00:00 GNU Enscript 1.6.1 and earlier allows local users to overwrite arbitrary files of the Enscript user via a symlink attack on temporary files.
3.6