Vulnerability Details : CVE-2002-0838
Buffer overflow in (1) gv 3.5.8 and earlier, (2) gvv 1.0.2 and earlier, (3) ggv 1.99.90 and earlier, (4) gnome-gv, and (5) kghostview in kdegraphics 2.2.2 and earlier, allows attackers to execute arbitrary code via a malformed (a) PDF or (b) PostScript file, which is processed by an unsafe call to sscanf.
Vulnerability category: OverflowExecute code
Products affected by CVE-2002-0838
- cpe:2.3:a:ggv:ggv:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ghostview:ghostview:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:ghostview:ghostview:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:ghostview:ghostview:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:ghostview:ghostview:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:2.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:2.7b1:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:3.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:3.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:2.7b2:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:2.7b3:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:3.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:3.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:2.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:3.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:3.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:3.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:2.7b4:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:2.7b5:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:3.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:gv:gv:3.4.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-0838
0.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-0838
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
References for CVE-2002-0838
-
http://www.redhat.com/support/errata/RHSA-2002-207.html
Support
-
http://www.iss.net/security_center/static/10201.php
Vendor Advisory
-
http://www.debian.org/security/2002/dsa-182
Debian -- The Universal Operating System
-
http://marc.info/?l=bugtraq&m=103305615613319&w=2
'iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv' - MARC
-
http://marc.info/?l=bugtraq&m=103487806800388&w=2
'GLSA: ggv' - MARC
-
http://www.debian.org/security/2002/dsa-176
Debian -- The Universal Operating System
-
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-053.0.txt
-
http://www.kb.cert.org/vuls/id/600777
VU#600777 - gv contains buffer overflow in sscanf() functionThird Party Advisory;US Government Resource
-
http://www.securityfocus.com/bid/5808
Exploit;Patch;Vendor Advisory
-
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/47780&zone_32=category:security
-
http://www.redhat.com/support/errata/RHSA-2002-212.html
SupportPatch;Vendor Advisory
-
http://www.kde.org/info/security/advisory-20021008-1.txt
-
http://www.mandriva.com/security/advisories?name=MDKSA-2002:069
Mandriva
-
http://www.debian.org/security/2002/dsa-179
Debian -- The Universal Operating System
-
http://www.mandriva.com/security/advisories?name=MDKSA-2002:071
Mandriva
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000542
CONECTIVA | AnĂ¡lises dos Melhores Produtos Online (#10 Melhores)
-
http://marc.info/?l=bugtraq&m=103305778615625&w=2
'Errata: iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv' - MARC
-
http://www.redhat.com/support/errata/RHSA-2002-220.html
Support
Jump to