First published: Fri Jan 21 2005(Updated: )
Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Enscript | =1.3.0 | |
GNU Enscript | =1.5.0 | |
GNU Enscript | =1.6.3 | |
GNU Enscript | =1.6.0 | |
GNU Enscript | =1.6.2 | |
GNU Enscript | =1.6.1 | |
GNU Enscript | =1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1185 is considered a high severity vulnerability due to its potential to allow arbitrary command execution.
To fix CVE-2004-1185, ensure you update to a patched version of GNU Enscript that sanitizes filenames.
CVE-2004-1185 affects GNU Enscript versions 1.3.0, 1.4.0, 1.5.0, and 1.6.0 through 1.6.3.
Yes, local users can exploit CVE-2004-1185 due to the lack of filename sanitization.
Yes, remote attackers can exploit CVE-2004-1185 by crafting malicious filenames.