9.3
CVSSv2

CVE-2008-4306

Published: 04/11/2008 Updated: 11/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in enscript prior to 1.6.4 has unknown impact and attack vectors, possibly related to the font escape sequence.

Vulnerable Product Search on Vulmon Subscribe to Product

ubuntu linux 7.10

ubuntu linux 8.04

ubuntu linux 8.10

ubuntu linux 6.06

Vendor Advisories

Debian Bug report logs - #506261 enscript: Buffer overflows Package: enscript; Maintainer for enscript is Tim Retout <diocles@debianorg>; Source for enscript is src:enscript (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 19 Nov 2008 22:30:05 UTC Severity: grave Tags: security Fou ...
Ulf Härnhammar discovered multiple stack overflows in enscript’s handling of special escape arguments If a user or automated system were tricked into processing a malicious file with the “-e” option enabled, a remote attacker could execute arbitrary code or cause enscript to crash, possibly leading to a denial of service ...
Synopsis Moderate: enscript security update Type/Severity Security Advisory: Moderate Topic An updated enscript packages that fixes several security issues is nowavailable for Red Hat Enterprise Linux 21, 3, and 4This update has been rated as having moderate security impact by the RedHat Security Response ...
Synopsis Moderate: enscript security update Type/Severity Security Advisory: Moderate Topic An updated enscript packages that fixes several security issues is nowavailable for Red Hat Enterprise Linux 5This update has been rated as having moderate security impact by the RedHat Security Response Team ...