First published: Fri Mar 28 2014(Updated: )
The fixps script in a2ps 4.14 does not use the -dSAFER option when executing gs, which allows context-dependent attackers to delete arbitrary files or execute arbitrary commands via a crafted PostScript file.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU a2ps | =4.14 | |
debian/a2ps | <=1:4.14-1.2<=1:4.14-1 | 1:4.14-1.3 1:4.14-1.1+deb7u1 1:4.14-1.1+deb6u1 |
debian/a2ps | 1:4.14-7 1:4.14-8 1:4.15.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0466 is considered to have medium severity due to the potential for file deletion and arbitrary command execution.
To fix CVE-2014-0466, update to a patched version of a2ps, specifically versions 1:4.14-1.3 or later.
The vulnerability CVE-2014-0466 affects the GNU a2ps version 4.14.
Yes, CVE-2014-0466 can potentially be exploited remotely through crafted PostScript files.
The potential impact of CVE-2014-0466 includes unauthorized deletion of files and execution of arbitrary commands.