First published: Mon Dec 15 2008(Updated: )
GNU enscript converts ASCII files to PostScript(R) language files and<br>spools the generated output to a specified printer or saves it to a file.<br>Enscript can be extended to handle different output media and includes<br>options for customizing printouts.<br>Several buffer overflow flaws were found in GNU enscript. An attacker could<br>craft an ASCII file in such a way that it could execute arbitrary commands<br>if the file was opened with enscript with the "special escapes" option (-e<br>or --escapes) enabled. (CVE-2008-3863, CVE-2008-4306, CVE-2008-5078)<br>All users of enscript should upgrade to these updated packages, which<br>contain backported patches to correct these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/enscript | <1.6.1-33.el4_7.1 | 1.6.1-33.el4_7.1 |
redhat/enscript | <1.6.1-33.el4_7.1 | 1.6.1-33.el4_7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2008:1021 is considered important due to potential buffer overflow vulnerabilities.
To fix RHSA-2008:1021, users should update to enscript version 1.6.1-33.el4_7.1 or later.
RHSA-2008:1021 addresses several buffer overflow vulnerabilities in the GNU enscript package.
RHSA-2008:1021 affects enscript versions earlier than 1.6.1-33.el4_7.1.
The recommended solution for RHSA-2008:1021 is to apply the update rather than seeking a workaround.