search menu icon-carat-right cmu-wordmark

CERT Coordination Center

GNU gv buffer overflow vulnerability

Vulnerability Note VU#352825

Original Release Date: 2006-11-28 | Last Revised: 2006-12-01

Overview

A buffer overflow vulnerability exists in the GNU gv viewer application. Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code, or cause a denial-of-service condition.

Description

From the GNU gv website:

GNU gv allows to view and navigate through PostScript and PDF documents on an X display by providing a user interface for the ghostscript interpreter.
gv is a improved derivation of Timothy O. Theisen's Ghostview developed by Johannes Plass.

A buffer overflow vulnerability exists in the GNU gv viewer. An attacker may be able to trigger the overflow by convincing a user to open a specially-crafted PostScript file.

Note that GNU gv is maintained and packaged by many vendors. Please see the systems affected portion of this document for a list of vendors who distribute GNU gv.

Impact

A remote, unauthenticated attacker may be able to execute code with the privileges of the user running GNU gv.

Solution

Upgrade
Apply an upgrade. See the systems affected portion of this document for information about specific vendors.


Do not execute GNU gv with root privileges

Using a non-privileged user account to launch GNU gv may mitigate the impact of this vulnerability.

Vendor Information

352825
 

View all 41 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was publicly reported by Renaud Lifchitz.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2006-5864
Severity Metric: 0.10
Date Public: 2006-11-09
Date First Published: 2006-11-28
Date Last Updated: 2006-12-01 20:42 UTC
Document Revision: 44

Sponsored by CISA.