Description
The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.
Product(s):
- GNU Enscript 1.4
- GNU Enscript 1.5
- GNU Enscript 1.6.1
- GNU Enscript 1.6.2
- GNU Enscript 1.6.3
- GNU Enscript 1.6.4
- GNU Enscript 1.6.1 beta
- GNU Enscript 1.6
- SGI ProPack 3.0
- Red Hat Fedora Core Core 2.0
- Red Hat Fedora Core Core 3.0
- SuSE SuSE Linux 1.0
- SuSE SuSE Linux 2.0
- SuSE SuSE Linux 3.0
- SuSE SuSE Linux 4.0
- SuSE SuSE Linux 4.2
- SuSE SuSE Linux 4.3
- SuSE SuSE Linux 4.4.1
- SuSE SuSE Linux 4.4
- SuSE SuSE Linux 5.0
- SuSE SuSE Linux 5.1
- SuSE SuSE Linux 5.2
- SuSE SuSE Linux 5.3
- SuSE SuSE Linux 6.0
- SuSE SuSE Linux 6.1
- SuSE SuSE Linux 6.1 alpha
- SuSE SuSE Linux 6.2
- SuSE SuSE Linux 6.3
- SUSE Linux 6.3 on PPC
- SuSE SuSE Linux 6.3 alpha
- SuSE SuSE Linux 6.4
- SUSE Linux 6.4 on i386
- SUSE Linux 6.4 on PPC
- SuSE SuSE Linux 6.4 alpha
- SuSE SuSE Linux 7.0
- SUSE Linux 7.0 on i386
- SUSE Linux 7.0 on PPC
- SUSE Linux 7.0 on SPARC
- SuSE SuSE Linux 7.0 alpha
- SuSE SuSE Linux 7.1
- SUSE Linux 7.1
- SUSE Linux 7.1 on SPARC
- SUSE Linux 7.1 on x86
- SuSE SuSE Linux 7.1 alpha
- SuSE SuSE Linux 7.2
- SUSE Linux 7.2 on i386
- SuSE SuSE Linux 7.3
- SUSE Linux 7.3 on i386
- SUSE Linux 7.3 on PPC
- SUSE Linux 7.3 on SPARC
- SuSE SuSE Linux 8.0
- SUSE Linux 8.0 on i386
- SuSE SuSE Linux 8.0 alpha
- SuSE SuSE Linux 8.1
- SuSE SuSE Linux 8.2
- SuSE SuSE Linux 9.0
- Suse Suse Linux 9.0 Enterprise Server Edition
- SUSE Linux 9.0 x86_64
- SuSE SuSE Linux 9.1
- SUSE Linux 9.1 on x86_64
- SuSE SuSE Linux 9.2
- SUSE Linux 9.2 on x86_64
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-1184, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-1184 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.