search menu icon-carat-right cmu-wordmark

CERT Coordination Center

gv contains buffer overflow in sscanf() function

Vulnerability Note VU#600777

Original Release Date: 2002-10-17 | Last Revised: 2002-10-17

Overview

A remotely exploitable buffer overflow vulnerability exists in gv.

Description

A remotely exploitable buffer overflow vulnerability exists in gv. gv allows a user to view and navigate PostScript and PDF documents by providing an interface to the ghostscript interpreter. This vulnerability can allow a remote attacker to execute arbitrary code on a vulnerable host.

Impact

A remote attacker can execute arbitrary code on a vulnerable host with the privileges of the victim.

Solution

Apply a patch.

Vendor Information

600777
 
Affected   Unknown   Unaffected

Debian

Updated:  October 17, 2002

Status

  Vulnerable

Vendor Statement

http://www.debian.org/security/2002/dsa-176

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Gentoo Linux

Updated:  October 17, 2002

Status

  Vulnerable

Vendor Statement

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200210-003
- - --------------------------------------------------------------------

PACKAGE : ggv
SUMMARY?: buffer overflow
EXPLOIT : local
DATE ?? : 2002-10-17 08:30 UTC

- - --------------------------------------------------------------------

ggv shares the same buffer overflow problem that gv did.

Read the full advisory at
http://www.idefense.com/advisory/09.26.02.txt

SOLUTION

It is recommended that all Gentoo Linux users who are running
app-text/ggv-1.99.90 and earlier update their systems
as follows:

emerge rsync
emerge ggv
emerge clean

- - --------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz
- - --------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE9rnUQfT7nyhUpoZMRAr6jAKCNU3Ko5pluB0bZ3yIlw4paUyrh1ACgqQbf
CvBJCihfTpuMWwci2+Rhn78=
=mnVF
-----END PGP SIGNATURE-----

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

KDE Desktop Environment Project

Updated:  October 17, 2002

Status

  Vulnerable

Vendor Statement

http://www.kde.org/info/security/advisory-20021008-1.txt

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Red Hat Inc.

Updated:  October 17, 2002

Status

  Vulnerable

Vendor Statement

http://rhn.redhat.com/errata/RHSA-2002-207.html

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Acknowledgements

Thanks to David Endler for reporting this vulnerability.

This document was written by Ian A Finlay.

Other Information

CVE IDs: CVE-2002-0838
Severity Metric: 16.50
Date Public: 2002-09-26
Date First Published: 2002-10-17
Date Last Updated: 2002-10-17 20:02 UTC
Document Revision: 13

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.