CVE-2008-3863
Currently unrated
Summary
Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.
References
EPSS Score
64% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved