Summary
The remote host is missing an update to gv
announced via advisory DSA 1214-2.
The original update provided in DSA 1214-1 was insufficient this update
corrects this. For reference the original advisory below:
Renaud Lifchitz discovered that gv, the PostScript and PDF viewer for X, performs insufficient boundary checks in the Postscript parsing code, which allows the execution of arbitrary code through a buffer overflow.
Solution
For the stable distribution (sarge) this problem has been fixed in version 3.6.1-10sarge2.
For the upcoming stable distribution (etch) this problem has been fixed in version 3.6.2-2.
For the unstable distribution (sid) this problem has been fixed in version 3.6.2-2.
We recommend that you upgrade your gv package.
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201214-2
Severity
Classification
-
CVE CVE-2006-5864 -
CVSS Base Score: 5.1
AV:N/AC:H/Au:N/C:P/I:P/A:P
Related Vulnerabilities