blob: 45be71876ecf129a17687e574e34e0b59d2ad41d [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200703-24">
<title>mgv: Stack overflow in included gv code</title>
mgv improperly handles user-supplied data possibly allowing for the
execution of arbitrary code.
<product type="ebuild">mgv</product>
<announced>March 26, 2007</announced>
<revised>March 26, 2007: 01</revised>
<package name="app-text/mgv" auto="yes" arch="*">
<vulnerable range="le">3.1.5</vulnerable>
mgv is a Postscript viewer with a Motif interface, based on Ghostview
and GNU gv.
mgv includes code from gv that does not properly boundary check
user-supplied data before copying it into process buffers.
<impact type="normal">
An attacker could entice a user to open a specially crafted Postscript
document with mgv and possibly execute arbitrary code with the rights
of the user running mgv.
There is no known workaround at this time.
mgv is currently unmaintained, and the mgv website no longer exists. As
such, the mgv package has been masked in Portage. We recommend that
users select an alternate Postscript viewer such as ghostview or
GSview, and unmerge mgv:
# emerge --unmerge &quot;app-text/mgv&quot;</code>
<uri link="">CVE-2006-5864</uri>
<uri link="/security/en/glsa/glsa-200611-20.xml">GLSA 200611-20</uri>
<metadata tag="requester" timestamp="Wed, 14 Mar 2007 07:32:05 +0000">
<metadata tag="submitter" timestamp="Tue, 20 Mar 2007 02:27:18 +0000">
<metadata tag="bugReady" timestamp="Mon, 26 Mar 2007 19:59:57 +0000">