CVE-2008-3863

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.6 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:C/I:C/A:C
flexeraCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
VendorProductVersion
gnuenscript
1.6.1
gnuenscript
1.6.4:beta
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
enscript
bookworm
1.6.5.90-3
fixed
bullseye
1.6.5.90-3
fixed
sid
1.6.5.90-3.1
fixed
trixie
1.6.5.90-3.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
enscript
intrepid
Fixed 1.6.4-12ubuntu0.8.10.1
released
hardy
Fixed 1.6.4-12ubuntu0.8.04.1
released
gutsy
Fixed 1.6.4-11ubuntu0.2
released
dapper
Fixed 1.6.4-7ubuntu0.2
released
References