Stack-based Buffer Overflow in GNU Enscript by GNU
CVE-2008-3863
Currently unrated
Summary
The vulnerability in GNU Enscript arises from a stack-based buffer overflow occurring in the read_special_escape function when the special escapes processing option is enabled. This flaw permits remote attackers, who can manipulate user input, to execute arbitrary code on the affected system through a specially crafted ASCII file, specifically targeting the setfilename command. This can lead to significant security risks if left unaddressed, as it may allow unauthorized access and control over affected environments.
References
EPSS Score
17% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved