Vulnerability Name: CVE-2002-0838 (CCN-10201) Assigned: 2002-09-26 Published: 2002-09-26 Updated: 2016-10-18 Summary: Buffer overflow in (1) gv 3.5.8 and earlier, (2) gvv 1.0.2 and earlier, (3) ggv 1.99.90 and earlier, (4) gnome-gv, and (5) kghostview in kdegraphics 2.2.2 and earlier, allows attackers to execute arbitrary code via a malformed (a) PDF or (b) PostScript file, which is processed by an unsafe call to sscanf. CVSS v3 Severity: 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: CALDERA Type: UNKNOWNCSSA-2002-053.0 Source: CCN Type: SCO Security Advisory CSSA-2002-053.0Linux: gv execution of arbitrary shell commands Source: CCN Type: iDEFENSE Security Advisory 09.26.2002Exploitable Buffer Overflow in gv Source: CCN Type: Conectiva Linux Announcement CLSA-2002:542gv/kghostview Source: MITRE Type: CNACVE-2002-0838 Source: CONECTIVA Type: UNKNOWNCLA-2002:542 Source: BUGTRAQ Type: UNKNOWN20020926 iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv Source: BUGTRAQ Type: UNKNOWN20020926 Errata: iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv Source: BUGTRAQ Type: UNKNOWN20021017 GLSA: ggv Source: CCN Type: BugTraq Mailing List, 2002-09-26 16:13:43Errata: iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv Source: CCN Type: Gentoo Linux Security Announcement 200210-003ggv Source: CCN Type: RHSA-2002-207Updated packages fix PostScript and PDF security issue Source: CCN Type: RHSA-2002-211ggv security update Source: CCN Type: RHSA-2002-212Updated packages fix PostScript and PDF security issue Source: CCN Type: RHSA-2002-220Updated KDE packages fix security issues Source: CCN Type: Sun Alert ID: 47780Sun Linux Security Vulnerability in "gv" ("Ghostview") Command Source: CONFIRM Type: UNKNOWNhttp://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/47780&zone_32=category:security Source: CCN Type: CIAC Information Bulletin N-020Red Hat Multiple Vulnerabilities in KDE Source: DEBIAN Type: UNKNOWNDSA-176 Source: DEBIAN Type: UNKNOWNDSA-179 Source: DEBIAN Type: UNKNOWNDSA-182 Source: DEBIAN Type: DSA-176gv -- buffer overflow Source: DEBIAN Type: DSA-179gnome-gv -- buffer overflow Source: DEBIAN Type: DSA-182kdegraphics -- buffer overflow Source: CCN Type: GLSA-200408-10gv: Exploitable Buffer Overflow Source: XF Type: Vendor Advisorygv-sscanf-function-bo(10201) Source: CCN Type: US-CERT VU#600777gv contains buffer overflow in sscanf() function Source: CERT-VN Type: Third Party Advisory, US Government ResourceVU#600777 Source: CCN Type: KDE Security Advisory 2002-10-08KGhostview Arbitary Code Execution Source: CONFIRM Type: UNKNOWNhttp://www.kde.org/info/security/advisory-20021008-1.txt Source: MANDRAKE Type: UNKNOWNMDKSA-2002:069 Source: MANDRAKE Type: UNKNOWNMDKSA-2002:071 Source: REDHAT Type: UNKNOWNRHSA-2002:207 Source: REDHAT Type: Patch, Vendor AdvisoryRHSA-2002:212 Source: REDHAT Type: UNKNOWNRHSA-2002:220 Source: BID Type: Exploit, Patch, Vendor Advisory5808 Source: CCN Type: BID-5808GV Malformed PDF/PS File Buffer Overflow Vulnerability Source: CCN Type: BID-581Ircd hybrid-6 Buffer Overflow Vulnerability Source: XF Type: UNKNOWNgv-sscanf-function-bo(10201) Vulnerable Configuration: Configuration 1 :cpe:/a:ggv:ggv:1.0.2:*:*:*:*:*:*:* OR cpe:/a:ghostview:ghostview:1.3:*:*:*:*:*:*:* OR cpe:/a:ghostview:ghostview:1.4:*:*:*:*:*:*:* OR cpe:/a:ghostview:ghostview:1.4.1:*:*:*:*:*:*:* OR cpe:/a:ghostview:ghostview:1.5:*:*:*:*:*:*:* OR cpe:/a:gv:gv:2.7.6:*:*:*:*:*:*:* OR cpe:/a:gv:gv:2.7b1:*:*:*:*:*:*:* OR cpe:/a:gv:gv:2.7b2:*:*:*:*:*:*:* OR cpe:/a:gv:gv:2.7b3:*:*:*:*:*:*:* OR cpe:/a:gv:gv:2.7b4:*:*:*:*:*:*:* OR cpe:/a:gv:gv:2.7b5:*:*:*:*:*:*:* OR cpe:/a:gv:gv:2.9.4:*:*:*:*:*:*:* OR cpe:/a:gv:gv:3.0.0:*:*:*:*:*:*:* OR cpe:/a:gv:gv:3.0.4:*:*:*:*:*:*:* OR cpe:/a:gv:gv:3.1.4:*:*:*:*:*:*:* OR cpe:/a:gv:gv:3.1.6:*:*:*:*:*:*:* OR cpe:/a:gv:gv:3.2.4:*:*:*:*:*:*:* OR cpe:/a:gv:gv:3.4.2:*:*:*:*:*:*:* OR cpe:/a:gv:gv:3.4.3:*:*:*:*:*:*:* OR cpe:/a:gv:gv:3.4.12:*:*:*:*:*:*:* OR cpe:/a:gv:gv:3.5.2:*:*:*:*:*:*:* OR cpe:/a:gv:gv:3.5.3:*:*:*:*:*:*:* OR cpe:/a:gv:gv:3.5.8:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:gnu:gv:3.5.8:*:*:*:*:*:*:* AND cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:* OR cpe:/a:redhat:linux_powertools:7.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:pseries:* OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:iseries:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
ggv ggv 1.0.2
ghostview ghostview 1.3
ghostview ghostview 1.4
ghostview ghostview 1.4.1
ghostview ghostview 1.5
gv gv 2.7.6
gv gv 2.7b1
gv gv 2.7b2
gv gv 2.7b3
gv gv 2.7b4
gv gv 2.7b5
gv gv 2.9.4
gv gv 3.0.0
gv gv 3.0.4
gv gv 3.1.4
gv gv 3.1.6
gv gv 3.2.4
gv gv 3.4.2
gv gv 3.4.3
gv gv 3.4.12
gv gv 3.5.2
gv gv 3.5.3
gv gv 3.5.8
gnu gv 3.5.8
redhat linux 6.2
debian debian linux 2.2
redhat linux 7
conectiva linux 6.0
redhat linux 7.1
mandrakesoft mandrake linux 8.0
conectiva linux 7.0
mandrakesoft mandrake linux 8.1
redhat linux 7.2
redhat linux powertools 7.0
mandrakesoft mandrake linux 8.2
conectiva linux 8.0
redhat linux 7.3
debian debian linux 3.0
gentoo linux *
redhat linux 8.0
mandrakesoft mandrake linux 9.0
redhat enterprise linux 2.1
redhat linux advanced workstation 2.1
redhat linux 7.1
redhat linux 7.1
mandrakesoft mandrake linux 8.0
mandrakesoft mandrake linux 8.1
mandrakesoft mandrake linux 8.2