Solution
Please Install the Updated Packages.
Insight
GNU enscript converts ASCII files to PostScript(R) language files and spools the generated output to a specified printer or saves it to a file.
Enscript can be extended to handle different output media and includes options for customizing printouts.
Several buffer overflow flaws were found in GNU enscript. An attacker could craft an ASCII file in such a way that it could execute arbitrary commands if the file was opened with enscript with the " special escapes"
option (-e
or --escapes) enabled. (CVE-2008-3863, CVE-2008-4306, CVE-2008-5078)
All users of enscript should upgrade to these updated packages, which contain backported patches to correct these issues.
Affected
enscript on Red Hat Enterprise Linux AS (Advanced Server) version 2.1, Red Hat Enterprise Linux ES version 2.1,
Red Hat Enterprise Linux WS version 2.1,
Red Hat Enterprise Linux AS version 3,
Red Hat Enterprise Linux ES version 3,
Red Hat Enterprise Linux WS version 3,
Red Hat Enterprise Linux AS version 4,
Red Hat Enterprise Linux ES version 4,
Red Hat Enterprise Linux WS version 4
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-3863, CVE-2008-4306, CVE-2008-5078 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities