Vulnerability Details : CVE-2004-1184
The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.
Products affected by CVE-2004-1184
- cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.1:alpha:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.3:*:ppc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.1:*:spa:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
- cpe:2.3:a:gnu:enscript:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:enscript:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:enscript:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:enscript:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:enscript:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:enscript:1.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:enscript:1.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-1184
0.94%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-1184
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
References for CVE-2004-1184
-
http://secunia.com/advisories/35074
About Secunia Research | Flexera
-
https://usn.ubuntu.com/68-1/
404: Page not found | Ubuntu
-
http://www.vupen.com/english/advisories/2009/1297
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://securitytracker.com/id?1012965
GoDaddy Domain Name Search
-
http://www.debian.org/security/2005/dsa-654
[SECURITY] [DSA 654-1] New enscript packages fix several vulnerabilitiesPatch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-040.html
SupportPatch;Vendor Advisory
-
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
-
http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml
enscript: Multiple vulnerabilities (GLSA 200502-03) — Gentoo securityPatch;Vendor Advisory
-
http://www.securityfocus.com/archive/1/435199/100/0/threaded
-
http://www.securityfocus.com/archive/1/419768/100/0/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/19012
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9658
404 Not Found
-
http://support.apple.com/kb/HT3549
About the security content of Security Update 2009-002 / Mac OS X v10.5.7 - Apple Support
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:033
Mandriva
-
http://www.securityfocus.com/bid/12329
-
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
Apple Updates for Multiple Vulnerabilities | CISAUS Government Resource
Jump to