Vulnerability Name:

CVE-2010-3441 (CCN-57639)

Assigned:2010-04-05
Published:2010-04-05
Updated:2020-08-14
Summary:Multiple buffer overflows in abcm2ps before 5.9.12 might allow remote attackers to execute arbitrary code via (1) a crafted input file, related to the PUT0 and PUT1 output macros; (2) a crafted input file, related to the trim_title function; and possibly (3) a long -O option on a command line.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-120
Vulnerability Consequences:Gain Access
References:Source: CONFIRM
Type: Issue Tracking, Mailing List, Third Party Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577014

Source: MITRE
Type: CNA
CVE-2010-3441

Source: FEDORA
Type: Third Party Advisory
FEDORA-2011-1092

Source: CCN
Type: abcm2ps Web page
Version 5.9.12 - 10/04/05

Source: CONFIRM
Type: Broken Link
http://moinejf.free.fr/abcm2ps-5.txt

Source: CCN
Type: SA39345
abcm2ps Multiple Unspecified Vulnerabilities

Source: SECUNIA
Type: Third Party Advisory
39345

Source: SECUNIA
Type: Third Party Advisory
43338

Source: MLIST
Type: Mailing List, Patch, Third Party Advisory
[oss-security] 20100408 CVE Request -- Abcm2ps v5.9.12 -- multiple unspecified vulnerabilities

Source: MLIST
Type: Mailing List, Patch, Third Party Advisory
[oss-security] 20100408 Re: CVE Request -- Abcm2ps v5.9.12 -- multiple unspecified vulnerabilities

Source: MLIST
Type: Mailing List, Patch, Third Party Advisory
[oss-security] 20100408 Re: CVE Request -- Abcm2ps v5.9.12 -- multiple unspecified vulnerabilities

Source: CCN
Type: OSVDB ID: 63582
abcm2ps PUT0 / PUT1 Macro Implementation Overflow

Source: CCN
Type: OSVDB ID: 63583
abcm2ps trim_title() Function Crafted File Handling Overflow

Source: CCN
Type: OSVDB ID: 65104
abcm2ps abc2ps.c getarena() Function Overflow

Source: CCN
Type: OSVDB ID: 72991
abcm2ps Multiple Unspecified Issues

Source: BID
Type: Third Party Advisory, VDB Entry
39271

Source: CCN
Type: BID-39271
abcm2ps Versions Prior to 5.9.12 Multiple Vulnerabilities

Source: VUPEN
Type: Third Party Advisory
ADV-2011-0390

Source: CONFIRM
Type: Issue Tracking, Patch, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=580435

Source: XF
Type: UNKNOWN
abcm2ps-command-line-bo(57639)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:moinejf:abcm2ps:*:*:*:*:*:*:*:* (Version < 5.9.12)

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:14:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.precise:def:20103441000
    V
    CVE-2010-3441 on Ubuntu 12.04 LTS (precise) - untriaged.
    2011-02-18
    BACK
    moinejf abcm2ps *
    fedoraproject fedora 14