DEBIAN-CVE-2006-5864

Advisory lineage Upstream: 1 Downstream: 3
Published: 11 Nov 2006, 01:07
Last modified:20 Nov 2025, 05:01

Vulnerability Summary

Overall Risk (default)
minimal
0/100
CVSS Score
No data
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

11 Nov 2006, 01:07
Published
Vulnerability first disclosed
20 Nov 2025, 05:01
Last Modified
Vulnerability information updated

Description

Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers. NOTE: this issue can be exploited through other products that use gv such as evince.

Affected Systems

  • debianevince

    < 0.4.0-3 | < 0.4.0-3 | < 0.4.0-3 | < 0.4.0-3

  • debiangv

    < 1:3.6.2-3 | < 1:3.6.2-3 | < 1:3.6.2-3 | < 1:3.6.2-3

References (1)