PSToText Arbitrary Script Code Execution Vulnerability
BID:17897
Info
PSToText Arbitrary Script Code Execution Vulnerability
| Bugtraq ID: | 17897 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | May 08 2006 12:00AM |
| Updated: | May 09 2006 10:24PM |
| Credit: | Brian May <[email protected]> discovered this issue. |
| Vulnerable: |
pstotext pstotext 1.9 Debian Linux 3.1 sparc Debian Linux 3.1 s/390 Debian Linux 3.1 ppc Debian Linux 3.1 mipsel Debian Linux 3.1 mips Debian Linux 3.1 m68k Debian Linux 3.1 ia-64 Debian Linux 3.1 ia-32 Debian Linux 3.1 hppa Debian Linux 3.1 arm Debian Linux 3.1 amd64 Debian Linux 3.1 alpha Debian Linux 3.1 |
| Not Vulnerable: | |
Discussion
PSToText Arbitrary Script Code Execution Vulnerability
The pstotext utility is susceptible to an arbitrary command-execution vulnerability. This issue is due to the application's failure to properly sanitize user-supplied input.
If pstotext is called with command-line arguments containing user-supplied data, attackers can execute arbitrary script code in the context of the application calling the vulnerable utility. This may aid attackers in the remote compromise of computers that use the utility in CGI scripts or in a printer-queue application.
Version 1.9 of pstotext is vulnerable to this issue; other versions may also be affected.
The pstotext utility is susceptible to an arbitrary command-execution vulnerability. This issue is due to the application's failure to properly sanitize user-supplied input.
If pstotext is called with command-line arguments containing user-supplied data, attackers can execute arbitrary script code in the context of the application calling the vulnerable utility. This may aid attackers in the remote compromise of computers that use the utility in CGI scripts or in a printer-queue application.
Version 1.9 of pstotext is vulnerable to this issue; other versions may also be affected.
Exploit / POC
PSToText Arbitrary Script Code Execution Vulnerability
Attackers use pre-existing network utilities, web clients, or other applications to exploit this issue, depending on the nature of the targeted application that uses the affected utility.
Attackers use pre-existing network utilities, web clients, or other applications to exploit this issue, depending on the nature of the targeted application that uses the affected utility.
Solution / Fix
PSToText Arbitrary Script Code Execution Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected]
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected]
References
PSToText Arbitrary Script Code Execution Vulnerability
References:
References:
- Debian Bug report logs - #356988 (Debian)
- pstotext Home Page (pstotext)