Upstream information

CVE-2008-3863 at MITRE

Description

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.6
Vector AV:N/AC:H/Au:N/C:C/I:C/A:C
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
SUSE Bugzilla entries: 433756 [RESOLVED / FIXED], 462353 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Module for Basesystem 15
SUSE Linux Enterprise Module for Basesystem 15 SP1
  • enscript >= 1.6.6-1.17
SUSE Linux Enterprise Server 11 SP1
  • enscript >= 1.6.4-152.17.55
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP4
  • enscript >= 1.6.4-152.22.1
openSUSE 11.0
  • enscript-debuginfo >= 1.6.4-124.2
  • enscript-debugsource >= 1.6.4-124.2
openSUSE 11.0
  • enscript >= 1.6.4-124.2
Novell Linux Desktop 9 for x86
Novell Linux Desktop 9 for x86_64
Open Enterprise Server
  • enscript >= 1.6.2-814.9
Builds
ZYPP Patch Nr: 5715
openSUSE Leap 15.0
  • enscript >= 1.6.6-lp150.1.4
Patchnames:
openSUSE Leap 15.0 GA enscript