First published: Mon Dec 01 2008(Updated: )
Multiple buffer overflows in the (1) recognize_eps_file function (src/psgen.c) and (2) tilde_subst function (src/util.c) in GNU enscript 1.6.1, and possibly earlier, might allow remote attackers to execute arbitrary code via an epsf escape sequence with a long filename.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gnu Escript | =1.6.1 | |
redhat/enscript | <0:1.6.1-33.el4_7.1 | 0:1.6.1-33.el4_7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5078 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2008-5078, update to enscript version 0:1.6.1-33.el4_7.1 or later.
CVE-2008-5078 is caused by multiple buffer overflows in specific functions of GNU enscript when handling EPS files.
Users and systems running GNU enscript version 1.6.1 and possibly earlier versions are affected by CVE-2008-5078.
Yes, CVE-2008-5078 can be exploited remotely by attackers sending crafted EPS filenames.