Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200408-10] gv: Exploitable Buffer Overflow


Vulnerability Assessment Details

[GLSA-200408-10] gv: Exploitable Buffer Overflow

Vulnerability Assessment Summary
gv: Exploitable Buffer Overflow

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200408-10
(gv: Exploitable Buffer Overflow)


gv contains a buffer overflow vulnerability where an unsafe sscanf() call
is used to interpret PDF and PostScript files.

Impact

By enticing a user to view a malformed PDF or PostScript file a possible hacker
could execute arbitrary code with the permissions of the user running gv.

Workaround

There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version of gv.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0838


Solution:
All gv users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=app-text/gv-3.5.8-r4"
# emerge ">=app-text/gv-3.5.8-r4"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi


Warning: mysql_connect(): Too many connections in /home/vscan/public_html/store/select.php on line 4

Warning: mysql_select_db() expects parameter 2 to be resource, boolean given in /home/vscan/public_html/store/select.php on line 5

Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/vscan/public_html/store/select.php on line 13


SQL Server 2019 Standard (10 CAL) - Windows and Linux, Physical License NEW picture

SQL Server 2019 Standard (10 CAL) - Windows and Linux, Physical License NEW

$178.45



Microsoft SQL Server 2019 Standard (10 CAL) Windows, Linux Physical License, NEW picture

Microsoft SQL Server 2019 Standard (10 CAL) Windows, Linux Physical License, NEW

$178.99



IBM X3200 M3 Tower Server Intel Xeon X3450 2.67GHz 2GB 2*500 Gb Hdd Linux AS IS picture

IBM X3200 M3 Tower Server Intel Xeon X3450 2.67GHz 2GB 2*500 Gb Hdd Linux AS IS

$60.00



NEW Redhat Enterprise Linux 7 Server Edition (Factory Sealed) picture

NEW Redhat Enterprise Linux 7 Server Edition (Factory Sealed)

$25.00



IBM E850 Power8 2x 12C 3.02GHz 512Gb 1.8Tb SAS 10GbE 16Gb Linux Server  8408-E8E picture

IBM E850 Power8 2x 12C 3.02GHz 512Gb 1.8Tb SAS 10GbE 16Gb Linux Server 8408-E8E

$699.95



Custom Laptop, Desktop or Server Badge - Set of 12 (Select your Linux distro) picture

Custom Laptop, Desktop or Server Badge - Set of 12 (Select your Linux distro)

$5.45



1U Server 15

1U Server 15" Depth X11SSH-F E3-1270 V6 3.8Ghz 4 Core 32GB RAM 240G SSD

$250.00



Custom Bootable OS - USB Flash Drive - Mint, Kali, Ubuntu, Zorin, Debian & More picture

Custom Bootable OS - USB Flash Drive - Mint, Kali, Ubuntu, Zorin, Debian & More

$4.25



SQL Server 2019 Standard (10 CAL) - Windows and Linux, Physical License picture

SQL Server 2019 Standard (10 CAL) - Windows and Linux, Physical License

$215.26



Linux Multi-Boot USB Installer 13-in-1 | Dual USB-A & USB-C | Ubuntu, Mint, Etc picture

Linux Multi-Boot USB Installer 13-in-1 | Dual USB-A & USB-C | Ubuntu, Mint, Etc

$19.99



Discussions

No Discussions have been posted on this vulnerability.