FORBIDDEN ports scheduled for removal
Kris Kennaway
kris at obsecurity.org
Fri Mar 28 04:23:41 PST 2003
On Fri, Mar 28, 2003 at 12:30:25PM +1030, Greg 'groggy' Lehey wrote:
> OK, found it at http://www.securityfocus.com/bid/5808. Discussion
> says:
>
> gv is a freely available, open source Portable Document Format (PDF)
> and PostScript (PS) viewing utility. It is available for Unix and
> Linux operating systems.
>
> It has been reported that an insecure sscanf() function exists in
> gv. Due to this function, an attacker may be able to put malicious
> code in the %%PageOrder: portion of a file. When this malicious file
> is opened with gv, the code would be executed in the security
> context of the local user.
>
> Note that this refers to gv, not ghostview. It's also incorrect with
> ghostview 1.5. The binary doesn't contain a sscanf() function. I've
> tried the exploit, and it didn't work. I'll check further, but I
> think this one can be allowed again.
Seems reasonable. It looks like sobomax marked this port FORBIDDEN by
mistake.
Kris
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-ports/attachments/20030328/ad33cef3/attachment.bin
More information about the freebsd-ports
mailing list