Package: gv
Version: 1:3.6.2-1
Severity: grave
Tags: security
Justification: user security hole
A vulnerability has been found in gv. From
http://secunia.com/advisories/22787/ :

"Renaud Lifchitz has reported a vulnerability in GNU gv, which can be exploited
by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error within the "ps_gettext()"
function in ps.c. This can be exploited to cause a stack-based buffer overflow
by e.g. tricking a user into opening a specially crafted PostScript file.

The vulnerability is reported in version 3.6.2. Other versions may also be
affected."


More information is at
http://sysdream.com/article.php?story_id=258&section_id=78


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to