First published: Sat Nov 11 2006(Updated: )
Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers. NOTE: this issue can be exploited through other products that use gv such as evince.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU gv | =3.6.1 | |
GNU gv | =3.6.2 | |
GNU gv | =3.5.8 | |
GNU gv | =3.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5864 is classified as a high severity vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2006-5864, update to the latest version of GNU gv that addresses this buffer overflow issue.
CVE-2006-5864 affects GNU gv versions 3.5.8, 3.6.0, 3.6.1, and 3.6.2.
CVE-2006-5864 requires user assistance to exploit, as it relies on opening a malicious PostScript file.
The attack vector for CVE-2006-5864 involves using a specially crafted PostScript file with long comments.