Vulnerability Note VU#600777

gv contains buffer overflow in sscanf() function

Original Release date: 17 Oct 2002 | Last revised: 17 Oct 2002

Overview

A remotely exploitable buffer overflow vulnerability exists in gv.

Description

A remotely exploitable buffer overflow vulnerability exists in gv. gv allows a user to view and navigate PostScript and PDF documents by providing an interface to the ghostscript interpreter. This vulnerability can allow a remote attacker to execute arbitrary code on a vulnerable host.

Impact

A remote attacker can execute arbitrary code on a vulnerable host with the privileges of the victim.

Solution

Apply a patch.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
DebianAffected-17 Oct 2002
Gentoo LinuxAffected-17 Oct 2002
KDE Desktop Environment ProjectAffected-17 Oct 2002
Red Hat Inc.Affected-17 Oct 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to David Endler for reporting this vulnerability.

This document was written by Ian A Finlay.

Other Information

  • CVE IDs: CAN-2002-0838
  • Date Public: 26 Sep 2002
  • Date First Published: 17 Oct 2002
  • Date Last Updated: 17 Oct 2002
  • Severity Metric: 16.50
  • Document Revision: 13

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.