Mandriva Linux Security Advisory 2008-243 - Two buffer overflow vulnerabilities were discovered in GNU enscript, which could allow an attacker to execute arbitrary commands via a specially crafted ASCII file, if the file were opened with the -e or --escapes option enabled. The updated packages have been patched to prevent these issues.
18a58b49039894f059ca64fe3985a33af581cd963f98cc0093cbaccc56628aae
Gentoo Linux Security Advisory GLSA 200812-02 - Two buffer overflows in enscript might lead to the execution of arbitrary code. Two stack-based buffer overflows in the read_special_escape() function in src/psgen.c have been reported. Ulf Harnhammar of Secunia Research discovered a vulnerability related to the setfilename command (CVE-2008-3863), and Kees Cook of Ubuntu discovered a vulnerability related to the font escape sequence (CVE-2008-4306). Versions less than 1.6.4-r4 are affected.
8cbd0e0780d7c5ffd3c6367c7776e0d6e14aa37279c75668c254b97bf5515cbf
Debian Security Advisory 1670-1 - Several vulnerabilities have been discovered in Enscript, a converter from ASCII text to Postscript, HTML or RTF.
392f0bed85e68fa6e0194697606daa62bbd30c5b28d7c3db04fc80753c02e2b6
Ubuntu Security Notice 660-1 - Ulf Harnhammar discovered multiple stack overflows in enscript's handling of special escape arguments. If a user or automated system were tricked into processing a malicious file with the "-e" option enabled, a remote attacker could execute arbitrary code or cause enscript to crash, possibly leading to a denial of service.
84459423b404f0b444e3aeb8cf1ecd2112972ac04d2ded5ee49b2d4d5fe9c5c0
Secunia Research has discovered a vulnerability in GNU Enscript, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error within the "read_special_escape()" function in src/psgen.c. This can be exploited to cause a stack-based buffer overflow by tricking the user into converting a malicious file. Successful exploitation allows execution of arbitrary code, but requires that special escapes processing is enabled with the "-e" option. GNU Enscript versions 1.6.1 and 1.6.4 beta are vulnerable.
8a7d447dd69db4f8d793cacd7994b607c6795026d0ed31d75ebc239dfccf920d