FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

nothing found there

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
a1126054-b57c-11dd-8892-0017319806e7enscript -- arbitrary code execution vulnerability

Ulf Harnhammar of Secunia Research reports:

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.


Discovery 2008-10-22
Entry 2008-11-18
enscript-a4
enscript-letter
enscript-letterdj
lt 1.6.4_2

CVE-2008-3863
CVE-2008-4306
http://secunia.com/secunia_research/2008-41/
72da8af6-7c75-11d9-8cc5-000854d03344enscript -- multiple vulnerabilities

Erik Sjölund discovered several issues in enscript: it suffers from several buffer overflows, quotes and shell escape characters are insufficiently sanitized in filenames, and it supported taking input from an arbitrary command pipe, with unwanted side effects.


Discovery 2005-02-02
Entry 2005-02-11
enscript-a4
enscript-letter
enscript-letterdj
lt 1.6.4_1

CVE-2004-1184
CVE-2004-1185
CVE-2004-1186
http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml