Unrated severityNVD Advisory· Published Nov 11, 2006· Updated Apr 23, 2026
CVE-2006-5864
CVE-2006-5864
Description
Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers. NOTE: this issue can be exploited through other products that use gv such as evince.
Affected products
4Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
39- www.securityfocus.com/bid/20978nvdExploit
- secunia.com/advisories/22787nvdVendor Advisory
- secunia.com/advisories/22932nvdVendor Advisory
- secunia.com/advisories/23006nvdVendor Advisory
- secunia.com/advisories/23018nvdVendor Advisory
- secunia.com/advisories/23111nvdVendor Advisory
- secunia.com/advisories/23118nvdVendor Advisory
- secunia.com/advisories/23183nvdVendor Advisory
- secunia.com/advisories/23266nvdVendor Advisory
- secunia.com/advisories/23306nvdVendor Advisory
- secunia.com/advisories/23335nvdVendor Advisory
- secunia.com/advisories/23353nvdVendor Advisory
- secunia.com/advisories/23409nvdVendor Advisory
- secunia.com/advisories/23579nvdVendor Advisory
- secunia.com/advisories/24649nvdVendor Advisory
- secunia.com/advisories/24787nvdVendor Advisory
- www.vupen.com/english/advisories/2006/4424nvdVendor Advisory
- www.vupen.com/english/advisories/2006/4747nvdVendor Advisory
- www.kb.cert.org/vuls/id/352825nvdUS Government Resource
- security.gentoo.org/glsa/glsa-200611-20.xmlnvd
- security.gentoo.org/glsa/glsa-200703-24.xmlnvd
- security.gentoo.org/glsa/glsa-200704-06.xmlnvd
- www.debian.org/security/2006/dsa-1214nvd
- www.debian.org/security/2006/dsa-1243nvd
- www.mandriva.com/security/advisoriesnvd
- www.mandriva.com/security/advisoriesnvd
- www.novell.com/linux/security/advisories/2006_26_sr.htmlnvd
- www.novell.com/linux/security/advisories/2006_28_sr.htmlnvd
- www.novell.com/linux/security/advisories/2006_29_sr.htmlnvd
- www.securityfocus.com/archive/1/451057/100/0/threadednvd
- www.securityfocus.com/archive/1/451422/100/200/threadednvd
- www.securityfocus.com/archive/1/452868/100/0/threadednvd
- www.ubuntu.com/usn/usn-390-1nvd
- www.ubuntu.com/usn/usn-390-2nvd
- www.ubuntu.com/usn/usn-390-3nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/30153nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/30555nvd
- issues.rpath.com/browse/RPL-850nvd
- www.exploit-db.com/exploits/2858nvd
News mentions
0No linked articles in our index yet.