SB2014040301 - Command injection in GNU a2p



SB2014040301 - Command injection in GNU a2p

Published: April 3, 2014 Updated: May 6, 2020

Security Bulletin ID SB2014040301
Severity
Low
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) OS Command Injection (CVE-ID: CVE-2014-0466)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation when processing PostScript files due to  fixps scrip in GNU a2ps does not use the -dSAFER option when executing gs. A remote unauthenticated attacker can trick the victim to open a specially crafted PostScript file and delete arbitrary files or execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.