Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2008-10-23 15:00
Updated : 2018-10-11 13:50
NVD link : CVE-2008-3863
Mitre link : CVE-2008-3863
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
gnu
- enscript