gv 3.5.8, and possibly earlier versions, allows remote attackers to execute arbitrary commands via shell metacharacters in the filename for (1) a PDF file or (2) a gzip file.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ghostview | Ghostview | 1.3 (including) | 1.3 (including) |
Ghostview | Ghostview | 1.4 (including) | 1.4 (including) |
Ghostview | Ghostview | 1.4.1 (including) | 1.4.1 (including) |
Ghostview | Ghostview | 1.5 (including) | 1.5 (including) |
Gv | Gv | 2.7.6 (including) | 2.7.6 (including) |
Gv | Gv | 2.7b1 (including) | 2.7b1 (including) |
Gv | Gv | 2.7b2 (including) | 2.7b2 (including) |
Gv | Gv | 2.7b3 (including) | 2.7b3 (including) |
Gv | Gv | 2.7b4 (including) | 2.7b4 (including) |
Gv | Gv | 2.7b5 (including) | 2.7b5 (including) |
Gv | Gv | 2.9.4 (including) | 2.9.4 (including) |
Gv | Gv | 3.0.0 (including) | 3.0.0 (including) |
Gv | Gv | 3.0.4 (including) | 3.0.4 (including) |
Gv | Gv | 3.1.4 (including) | 3.1.4 (including) |
Gv | Gv | 3.1.6 (including) | 3.1.6 (including) |
Gv | Gv | 3.2.4 (including) | 3.2.4 (including) |
Gv | Gv | 3.4.2 (including) | 3.4.2 (including) |
Gv | Gv | 3.4.3 (including) | 3.4.3 (including) |
Gv | Gv | 3.4.12 (including) | 3.4.12 (including) |
Gv | Gv | 3.5.2 (including) | 3.5.2 (including) |
Gv | Gv | 3.5.3 (including) | 3.5.3 (including) |
Gv | Gv | 3.5.8 (including) | 3.5.8 (including) |