Vulnerability Description
Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers. NOTE: this issue can be exploited through other products that use gv such as evince.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Gv | 3.5.8 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/22787Vendor Advisory
- http://secunia.com/advisories/22932Vendor Advisory
- http://secunia.com/advisories/23006Vendor Advisory
- http://secunia.com/advisories/23018Vendor Advisory
- http://secunia.com/advisories/23111Vendor Advisory
- http://secunia.com/advisories/23118Vendor Advisory
- http://secunia.com/advisories/23183Vendor Advisory
- http://secunia.com/advisories/23266Vendor Advisory
- http://secunia.com/advisories/23306Vendor Advisory
- http://secunia.com/advisories/23335Vendor Advisory
- http://secunia.com/advisories/23353Vendor Advisory
- http://secunia.com/advisories/23409Vendor Advisory
- http://secunia.com/advisories/23579Vendor Advisory
- http://secunia.com/advisories/24649Vendor Advisory
- http://secunia.com/advisories/24787Vendor Advisory
FAQ
What is CVE-2006-5864?
CVE-2006-5864 is a vulnerability with a CVSS score of 5.1 (MEDIUM). Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with...
How severe is CVE-2006-5864?
CVE-2006-5864 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5864?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Gv.