gv 3.5.8, and possibly earlier versions, allows remote attackers to execute arbitrary commands via shell metacharacters in the filename for (1) a PDF file or (2) a gzip file.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ghostview | Ghostview | 1.3 | 1.3 |
Ghostview | Ghostview | 1.4 | 1.4 |
Ghostview | Ghostview | 1.4.1 | 1.4.1 |
Ghostview | Ghostview | 1.5 | 1.5 |
Gv | Gv | 2.7.6 | 2.7.6 |
Gv | Gv | 2.7b1 | 2.7b1 |
Gv | Gv | 2.7b2 | 2.7b2 |
Gv | Gv | 2.7b3 | 2.7b3 |
Gv | Gv | 2.7b4 | 2.7b4 |
Gv | Gv | 2.7b5 | 2.7b5 |
Gv | Gv | 2.9.4 | 2.9.4 |
Gv | Gv | 3.0.0 | 3.0.0 |
Gv | Gv | 3.0.4 | 3.0.4 |
Gv | Gv | 3.1.4 | 3.1.4 |
Gv | Gv | 3.1.6 | 3.1.6 |
Gv | Gv | 3.2.4 | 3.2.4 |
Gv | Gv | 3.4.2 | 3.4.2 |
Gv | Gv | 3.4.3 | 3.4.3 |
Gv | Gv | 3.4.12 | 3.4.12 |
Gv | Gv | 3.5.2 | 3.5.2 |
Gv | Gv | 3.5.3 | 3.5.3 |
Gv | Gv | 3.5.8 | 3.5.8 |