Stack-based Buffer Overflow in GNU Enscript by GNU
CVE-2008-3863

Currently unrated

Key Information:

Vendor
Gnu
Status
Vendor
CVE Published:
23 October 2008

Summary

The vulnerability in GNU Enscript arises from a stack-based buffer overflow occurring in the read_special_escape function when the special escapes processing option is enabled. This flaw permits remote attackers, who can manipulate user input, to execute arbitrary code on the affected system through a specially crafted ASCII file, specifically targeting the setfilename command. This can lead to significant security risks if left unaddressed, as it may allow unauthorized access and control over affected environments.

References

EPSS Score

17% chance of being exploited in the next 30 days.

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.