Lucene search

K
gentooGentoo FoundationGLSA-201701-67
HistoryJan 29, 2017 - 12:00 a.m.

a2ps: Arbitrary code execution

2017-01-2900:00:00
Gentoo Foundation
security.gentoo.org
32

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.004

Percentile

74.4%

Background

a2ps is an Any to PostScript filter.

Description

a2ps’ fixps script does not invoke gs with the -dSAFER option.

Impact

Remote attackers, by enticing a user to process a specially crafted PostScript file, could delete arbitrary files or execute arbitrary code with the privileges of the process.

Workaround

There is no known workaround at this time.

Resolution

All a2ps users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-text/a2ps-4.14-r5"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-text/a2ps< 4.14-r5UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.004

Percentile

74.4%