CVE-2004-1184

The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.
References
Link Resource
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://secunia.com/advisories/35074
http://securitytracker.com/id?1012965
http://support.apple.com/kb/HT3549
http://www.debian.org/security/2005/dsa-654 Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:033
http://www.redhat.com/support/errata/RHSA-2005-040.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/419768/100/0/threaded
http://www.securityfocus.com/archive/1/435199/100/0/threaded
http://www.securityfocus.com/bid/12329
http://www.us-cert.gov/cas/techalerts/TA09-133A.html US Government Resource
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/19012
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9658
https://usn.ubuntu.com/68-1/
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://secunia.com/advisories/35074
http://securitytracker.com/id?1012965
http://support.apple.com/kb/HT3549
http://www.debian.org/security/2005/dsa-654 Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:033
http://www.redhat.com/support/errata/RHSA-2005-040.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/419768/100/0/threaded
http://www.securityfocus.com/archive/1/435199/100/0/threaded
http://www.securityfocus.com/bid/12329
http://www.us-cert.gov/cas/techalerts/TA09-133A.html US Government Resource
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/19012
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9658
https://usn.ubuntu.com/68-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:enscript:1.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:enscript:1.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:enscript:1.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:enscript:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:enscript:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:enscript:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:enscript:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.1:alpha:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.3:*:ppc:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.1:*:spa:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*

History

20 Nov 2024, 23:50

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2009/May/msg00002.html - () http://lists.apple.com/archives/security-announce/2009/May/msg00002.html -
References () http://secunia.com/advisories/35074 - () http://secunia.com/advisories/35074 -
References () http://securitytracker.com/id?1012965 - () http://securitytracker.com/id?1012965 -
References () http://support.apple.com/kb/HT3549 - () http://support.apple.com/kb/HT3549 -
References () http://www.debian.org/security/2005/dsa-654 - Patch, Vendor Advisory () http://www.debian.org/security/2005/dsa-654 - Patch, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml - Patch, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:033 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:033 -
References () http://www.redhat.com/support/errata/RHSA-2005-040.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-040.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/419768/100/0/threaded - () http://www.securityfocus.com/archive/1/419768/100/0/threaded -
References () http://www.securityfocus.com/archive/1/435199/100/0/threaded - () http://www.securityfocus.com/archive/1/435199/100/0/threaded -
References () http://www.securityfocus.com/bid/12329 - () http://www.securityfocus.com/bid/12329 -
References () http://www.us-cert.gov/cas/techalerts/TA09-133A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA09-133A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2009/1297 - () http://www.vupen.com/english/advisories/2009/1297 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19012 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/19012 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9658 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9658 -
References () https://usn.ubuntu.com/68-1/ - () https://usn.ubuntu.com/68-1/ -

Information

Published : 2005-01-21 05:00

Updated : 2024-11-20 23:50


NVD link : CVE-2004-1184

Mitre link : CVE-2004-1184

CVE.ORG link : CVE-2004-1184


JSON object : View

Products Affected

sgi

  • propack

suse

  • suse_linux

redhat

  • fedora_core

gnu

  • enscript