Upstream information
Description
Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers. NOTE: this issue can be exploited through other products that use gv such as evince.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 5.1 |
Vector | AV:N/AC:H/Au:N/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
SUSE Security Advisories:
- SUSE-SR:2006:026, published Fri, 17 Nov 2006 15:00:00 +0000
- SUSE-SR:2006:028, published Fri, 08 Dec 2006 17:00:00 +0000
- SUSE-SR:2006:029, published Tue, 19 Dec 2006 15:00:00 +0000
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Linux Enterprise Desktop 11 SP4 SUSE Linux Enterprise Server for SAP Applications 11 SP4 SUSE Linux Enterprise Software Development Kit 11 SP4 |
| Patchnames: SUSE Linux Enterprise Software Development Kit 11 SP4 GA evince-devel-2.28.2-0.7.2 |
SUSE Linux Enterprise Server 11 SP1 |
| Patchnames: SUSE Linux Enterprise Server 11 SP1 GA evince-2.28.2-0.2.68 |
SUSE Linux Enterprise Server 11 SP2 |
| Patchnames: SUSE Linux Enterprise Server 11 SP2 GA evince-2.28.2-0.7.2 |
SUSE Linux Enterprise Server 11 SP3 |
| Patchnames: SUSE Linux Enterprise Server 11 SP3 GA evince-2.28.2-0.7.2 |
SUSE Linux Enterprise Server 11 SP4 |
| Patchnames: SUSE Linux Enterprise Server 11 SP4 GA evince-2.28.2-0.7.2 SUSE Linux Enterprise Software Development Kit 11 SP4 GA evince-devel-2.28.2-0.7.2 |
openSUSE Tumbleweed |
| Patchnames: openSUSE-Tumbleweed-2024-10742 |
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 05:16:57 2013CVE page last modified: Sat Jun 15 20:48:12 2024