First published: Fri Jan 21 2005(Updated: )
The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Enscript | =1.4 | |
GNU Enscript | =1.5 | |
GNU Enscript | =1.6 | |
GNU Enscript | =1.6.1 | |
GNU Enscript | =1.6.2 | |
GNU Enscript | =1.6.3 | |
GNU Enscript | =1.6.4 | |
SGI ProPack | =3.0 | |
Red Hat Fedora Core | =core_2.0 | |
Red Hat Fedora Core | =core_3.0 | |
SUSE Linux | =1.0 | |
SUSE Linux | =2.0 | |
SUSE Linux | =3.0 | |
SUSE Linux | =4.0 | |
SUSE Linux | =4.2 | |
SUSE Linux | =4.3 | |
SUSE Linux | =4.4 | |
SUSE Linux | =4.4.1 | |
SUSE Linux | =5.0 | |
SUSE Linux | =5.1 | |
SUSE Linux | =5.2 | |
SUSE Linux | =5.3 | |
SUSE Linux | =6.0 | |
SUSE Linux | =6.1 | |
SUSE Linux | =6.1-alpha | |
SUSE Linux | =6.2 | |
SUSE Linux | =6.3 | |
SUSE Linux | =6.3 | |
SUSE Linux | =6.3-alpha | |
SUSE Linux | =6.4 | |
SUSE Linux | =6.4 | |
SUSE Linux | =6.4 | |
SUSE Linux | =6.4-alpha | |
SUSE Linux | =7.0 | |
SUSE Linux | =7.0 | |
SUSE Linux | =7.0 | |
SUSE Linux | =7.0 | |
SUSE Linux | =7.0-alpha | |
SUSE Linux | =7.1 | |
SUSE Linux | =7.1 | |
SUSE Linux | =7.1 | |
SUSE Linux | =7.1 | |
SUSE Linux | =7.1-alpha | |
SUSE Linux | =7.2 | |
SUSE Linux | =7.2 | |
SUSE Linux | =7.3 | |
SUSE Linux | =7.3 | |
SUSE Linux | =7.3 | |
SUSE Linux | =7.3 | |
SUSE Linux | =8.0 | |
SUSE Linux | =8.0 | |
SUSE Linux | =8.1 | |
SUSE Linux | =8.2 | |
SUSE Linux | =9.0 | |
SUSE Linux | =9.0 | |
SUSE Linux | =9.1 | |
SUSE Linux | =9.1 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1184 has been classified as a high severity vulnerability due to potential arbitrary command execution.
To fix CVE-2004-1184, update the GNU Enscript software to a version that is not affected by this vulnerability, particularly versions after 1.6.3.
Users of GNU Enscript versions 1.4 through 1.6.3 are affected by CVE-2004-1184.
CVE-2004-1184 allows attackers to execute arbitrary commands on affected systems, posing a serious security risk.
Yes, CVE-2004-1184 can be exploited by both remote attackers and local users.