First published: Sat Oct 25 2003(Updated: )
gv 3.5.8, and possibly earlier versions, allows remote attackers to execute arbitrary commands via shell metacharacters in the filename for (1) a PDF file or (2) a gzip file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ghostview | =1.3 | |
Ghostview | =1.4 | |
Ghostview | =1.4.1 | |
Ghostview | =1.5 | |
GeoVision | =2.7.6 | |
GeoVision | =2.7b1 | |
GeoVision | =2.7b2 | |
GeoVision | =2.7b3 | |
GeoVision | =2.7b4 | |
GeoVision | =2.7b5 | |
GeoVision | =2.9.4 | |
GeoVision | =3.0.0 | |
GeoVision | =3.0.4 | |
GeoVision | =3.1.4 | |
GeoVision | =3.1.6 | |
GeoVision | =3.2.4 | |
GeoVision | =3.4.2 | |
GeoVision | =3.4.3 | |
GeoVision | =3.4.12 | |
GeoVision | =3.5.2 | |
GeoVision | =3.5.3 | |
GeoVision | =3.5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1569 is categorized as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2002-1569, update to a patched version of the gv software that resolves the command execution issue.
CVE-2002-1569 affects gv versions up to and including 3.5.8, as well as potentially earlier versions.
Yes, CVE-2002-1569 can be exploited remotely through crafted filenames for PDF or gzip files.
CVE-2002-1569 can be triggered by specially crafted PDF or gzip filenames that contain shell metacharacters.