Vulnerability Name:

CVE-2002-0838 (CCN-10201)

Assigned:2002-09-26
Published:2002-09-26
Updated:2016-10-18
Summary:Buffer overflow in (1) gv 3.5.8 and earlier, (2) gvv 1.0.2 and earlier, (3) ggv 1.99.90 and earlier, (4) gnome-gv, and (5) kghostview in kdegraphics 2.2.2 and earlier, allows attackers to execute arbitrary code via a malformed (a) PDF or (b) PostScript file, which is processed by an unsafe call to sscanf.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CALDERA
Type: UNKNOWN
CSSA-2002-053.0

Source: CCN
Type: SCO Security Advisory CSSA-2002-053.0
Linux: gv execution of arbitrary shell commands

Source: CCN
Type: iDEFENSE Security Advisory 09.26.2002
Exploitable Buffer Overflow in gv

Source: CCN
Type: Conectiva Linux Announcement CLSA-2002:542
gv/kghostview

Source: MITRE
Type: CNA
CVE-2002-0838

Source: CONECTIVA
Type: UNKNOWN
CLA-2002:542

Source: BUGTRAQ
Type: UNKNOWN
20020926 iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv

Source: BUGTRAQ
Type: UNKNOWN
20020926 Errata: iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv

Source: BUGTRAQ
Type: UNKNOWN
20021017 GLSA: ggv

Source: CCN
Type: BugTraq Mailing List, 2002-09-26 16:13:43
Errata: iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv

Source: CCN
Type: Gentoo Linux Security Announcement 200210-003
ggv

Source: CCN
Type: RHSA-2002-207
Updated packages fix PostScript and PDF security issue

Source: CCN
Type: RHSA-2002-211
ggv security update

Source: CCN
Type: RHSA-2002-212
Updated packages fix PostScript and PDF security issue

Source: CCN
Type: RHSA-2002-220
Updated KDE packages fix security issues

Source: CCN
Type: Sun Alert ID: 47780
Sun Linux Security Vulnerability in "gv" ("Ghostview") Command

Source: CONFIRM
Type: UNKNOWN
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/47780&zone_32=category:security

Source: CCN
Type: CIAC Information Bulletin N-020
Red Hat Multiple Vulnerabilities in KDE

Source: DEBIAN
Type: UNKNOWN
DSA-176

Source: DEBIAN
Type: UNKNOWN
DSA-179

Source: DEBIAN
Type: UNKNOWN
DSA-182

Source: DEBIAN
Type: DSA-176
gv -- buffer overflow

Source: DEBIAN
Type: DSA-179
gnome-gv -- buffer overflow

Source: DEBIAN
Type: DSA-182
kdegraphics -- buffer overflow

Source: CCN
Type: GLSA-200408-10
gv: Exploitable Buffer Overflow

Source: XF
Type: Vendor Advisory
gv-sscanf-function-bo(10201)

Source: CCN
Type: US-CERT VU#600777
gv contains buffer overflow in sscanf() function

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#600777

Source: CCN
Type: KDE Security Advisory 2002-10-08
KGhostview Arbitary Code Execution

Source: CONFIRM
Type: UNKNOWN
http://www.kde.org/info/security/advisory-20021008-1.txt

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2002:069

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2002:071

Source: REDHAT
Type: UNKNOWN
RHSA-2002:207

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2002:212

Source: REDHAT
Type: UNKNOWN
RHSA-2002:220

Source: BID
Type: Exploit, Patch, Vendor Advisory
5808

Source: CCN
Type: BID-5808
GV Malformed PDF/PS File Buffer Overflow Vulnerability

Source: CCN
Type: BID-581
Ircd hybrid-6 Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
gv-sscanf-function-bo(10201)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ggv:ggv:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ghostview:ghostview:1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ghostview:ghostview:1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ghostview:ghostview:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ghostview:ghostview:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:2.7.6:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:2.7b1:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:2.7b2:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:2.7b3:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:2.7b4:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:2.7b5:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:2.9.4:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:3.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:3.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:3.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:3.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:3.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:3.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:3.4.12:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:3.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:3.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:gv:gv:3.5.8:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gnu:gv:3.5.8:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:linux_powertools:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:pseries:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:iseries:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:182
    V
    buffer overflow
    2002-10-28
    oval:org.debian:def:179
    V
    buffer overflow
    2002-10-18
    oval:org.debian:def:176
    V
    buffer overflow
    2002-10-16
    BACK
    ggv ggv 1.0.2
    ghostview ghostview 1.3
    ghostview ghostview 1.4
    ghostview ghostview 1.4.1
    ghostview ghostview 1.5
    gv gv 2.7.6
    gv gv 2.7b1
    gv gv 2.7b2
    gv gv 2.7b3
    gv gv 2.7b4
    gv gv 2.7b5
    gv gv 2.9.4
    gv gv 3.0.0
    gv gv 3.0.4
    gv gv 3.1.4
    gv gv 3.1.6
    gv gv 3.2.4
    gv gv 3.4.2
    gv gv 3.4.3
    gv gv 3.4.12
    gv gv 3.5.2
    gv gv 3.5.3
    gv gv 3.5.8
    gnu gv 3.5.8
    redhat linux 6.2
    debian debian linux 2.2
    redhat linux 7
    conectiva linux 6.0
    redhat linux 7.1
    mandrakesoft mandrake linux 8.0
    conectiva linux 7.0
    mandrakesoft mandrake linux 8.1
    redhat linux 7.2
    redhat linux powertools 7.0
    mandrakesoft mandrake linux 8.2
    conectiva linux 8.0
    redhat linux 7.3
    debian debian linux 3.0
    gentoo linux *
    redhat linux 8.0
    mandrakesoft mandrake linux 9.0
    redhat enterprise linux 2.1
    redhat linux advanced workstation 2.1
    redhat linux 7.1
    redhat linux 7.1
    mandrakesoft mandrake linux 8.0
    mandrakesoft mandrake linux 8.1
    mandrakesoft mandrake linux 8.2