7.5
CVSSv2

CVE-2004-1185

Published: 21/01/2005 Updated: 19/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu enscript 1.6.0

gnu enscript 1.6.1

gnu enscript 1.4.0

gnu enscript 1.5.0

gnu enscript 1.3.0

gnu enscript 1.6.2

gnu enscript 1.6.3

Vendor Advisories

Erik Sj�lund discovered several vulnerabilities in enscript which could cause arbitrary code execution with the privileges of the user calling enscript ...
Synopsis enscript security update Type/Severity Security Advisory: Low Topic An updated enscript package that fixes several security issues is nowavailable Description GNU enscript converts ASCII files to PostScriptEnscript has the ability to interpret special escape sequences A flaw was ...
Synopsis enscript security update Type/Severity Security Advisory: Low Topic An updated enscript package that fixes several security issues is nowavailable for Red Hat Enterprise Linux 4This update has been rated as having low security impact by the Red HatSecurity Response Team Description ...
Erik Sjölund has discovered several security relevant problems in enscript, a program to convert ASCII text into Postscript and other formats The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CAN-2004-1184 Unsanitised input can cause the execution of arbitrary commands via EPSF pipe support This ...