Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux SE 1.5
Astra Linux SE 1.6
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:52327
[Eng]
Version
2
Class
vulnerability
ALTXid
222557
Language
Russian
Severity
NotAvailable
Title
Debian -- уязвимость в gv, gnome-gv, kdegraphics (CVE-2002-0838)
Description
В продуктах gv, gnome-gv, kdegraphics обнаружена уязвимость CVE-2002-0838.
Family
unix
Platform
Debian GNU/Linux 2.2
Debian GNU/Linux 3.0
Product
gnome-gv
gv
kdegraphics
Reference
FSTEC: BDU:2015-08209
FSTEC: BDU:2015-08209
Id:
BDU:2015-08209
Reference:
https://bdu.fstec.ru/vul/2015-08209
FSTEC: BDU:2015-08106
FSTEC: BDU:2015-08106
Id:
BDU:2015-08106
Reference:
https://bdu.fstec.ru/vul/2015-08106
FSTEC: BDU:2015-08104
FSTEC: BDU:2015-08104
Id:
BDU:2015-08104
Reference:
https://bdu.fstec.ru/vul/2015-08104
FSTEC: BDU:2015-08101
FSTEC: BDU:2015-08101
Id:
BDU:2015-08101
Reference:
https://bdu.fstec.ru/vul/2015-08101
FSTEC: BDU:2015-08099
FSTEC: BDU:2015-08099
Id:
BDU:2015-08099
Reference:
https://bdu.fstec.ru/vul/2015-08099
FSTEC: BDU:2015-08097
FSTEC: BDU:2015-08097
Id:
BDU:2015-08097
Reference:
https://bdu.fstec.ru/vul/2015-08097
FSTEC: BDU:2015-08096
FSTEC: BDU:2015-08096
Id:
BDU:2015-08096
Reference:
https://bdu.fstec.ru/vul/2015-08096
FSTEC: BDU:2015-08095
FSTEC: BDU:2015-08095
Id:
BDU:2015-08095
Reference:
https://bdu.fstec.ru/vul/2015-08095
FSTEC: BDU:2015-08094
FSTEC: BDU:2015-08094
Id:
BDU:2015-08094
Reference:
https://bdu.fstec.ru/vul/2015-08094
FSTEC: BDU:2015-08092
FSTEC: BDU:2015-08092
Id:
BDU:2015-08092
Reference:
https://bdu.fstec.ru/vul/2015-08092
FSTEC: BDU:2015-08091
FSTEC: BDU:2015-08091
Id:
BDU:2015-08091
Reference:
https://bdu.fstec.ru/vul/2015-08091
FSTEC: BDU:2015-08090
FSTEC: BDU:2015-08090
Id:
BDU:2015-08090
Reference:
https://bdu.fstec.ru/vul/2015-08090
FSTEC: BDU:2015-08089
FSTEC: BDU:2015-08089
Id:
BDU:2015-08089
Reference:
https://bdu.fstec.ru/vul/2015-08089
FSTEC: BDU:2015-08088
FSTEC: BDU:2015-08088
Id:
BDU:2015-08088
Reference:
https://bdu.fstec.ru/vul/2015-08088
FSTEC: BDU:2015-08055
FSTEC: BDU:2015-08055
Id:
BDU:2015-08055
Reference:
https://bdu.fstec.ru/vul/2015-08055
FSTEC: BDU:2015-08053
FSTEC: BDU:2015-08053
Id:
BDU:2015-08053
Reference:
https://bdu.fstec.ru/vul/2015-08053
FSTEC: BDU:2015-08051
FSTEC: BDU:2015-08051
Id:
BDU:2015-08051
Reference:
https://bdu.fstec.ru/vul/2015-08051
FSTEC: BDU:2015-08050
FSTEC: BDU:2015-08050
Id:
BDU:2015-08050
Reference:
https://bdu.fstec.ru/vul/2015-08050
FSTEC: BDU:2015-08048
FSTEC: BDU:2015-08048
Id:
BDU:2015-08048
Reference:
https://bdu.fstec.ru/vul/2015-08048
FSTEC: BDU:2015-08046
FSTEC: BDU:2015-08046
Id:
BDU:2015-08046
Reference:
https://bdu.fstec.ru/vul/2015-08046
FSTEC: BDU:2015-08044
FSTEC: BDU:2015-08044
Id:
BDU:2015-08044
Reference:
https://bdu.fstec.ru/vul/2015-08044
FSTEC: BDU:2015-08041
FSTEC: BDU:2015-08041
Id:
BDU:2015-08041
Reference:
https://bdu.fstec.ru/vul/2015-08041
FSTEC: BDU:2015-08039
FSTEC: BDU:2015-08039
Id:
BDU:2015-08039
Reference:
https://bdu.fstec.ru/vul/2015-08039
FSTEC: BDU:2015-08037
FSTEC: BDU:2015-08037
Id:
BDU:2015-08037
Reference:
https://bdu.fstec.ru/vul/2015-08037
FSTEC: BDU:2015-08036
FSTEC: BDU:2015-08036
Id:
BDU:2015-08036
Reference:
https://bdu.fstec.ru/vul/2015-08036
FSTEC: BDU:2015-08035
FSTEC: BDU:2015-08035
Id:
BDU:2015-08035
Reference:
https://bdu.fstec.ru/vul/2015-08035
FSTEC: BDU:2015-08034
FSTEC: BDU:2015-08034
Id:
BDU:2015-08034
Reference:
https://bdu.fstec.ru/vul/2015-08034
FSTEC: BDU:2015-08029
FSTEC: BDU:2015-08029
Id:
BDU:2015-08029
Reference:
https://bdu.fstec.ru/vul/2015-08029
FSTEC: BDU:2015-08027
FSTEC: BDU:2015-08027
Id:
BDU:2015-08027
Reference:
https://bdu.fstec.ru/vul/2015-08027
FSTEC: BDU:2015-08026
FSTEC: BDU:2015-08026
Id:
BDU:2015-08026
Reference:
https://bdu.fstec.ru/vul/2015-08026
FSTEC: BDU:2015-08024
FSTEC: BDU:2015-08024
Id:
BDU:2015-08024
Reference:
https://bdu.fstec.ru/vul/2015-08024
FSTEC: BDU:2015-08023
FSTEC: BDU:2015-08023
Id:
BDU:2015-08023
Reference:
https://bdu.fstec.ru/vul/2015-08023
FSTEC: BDU:2015-08022
FSTEC: BDU:2015-08022
Id:
BDU:2015-08022
Reference:
https://bdu.fstec.ru/vul/2015-08022
FSTEC: BDU:2015-08021
FSTEC: BDU:2015-08021
Id:
BDU:2015-08021
Reference:
https://bdu.fstec.ru/vul/2015-08021
FSTEC: BDU:2015-08020
FSTEC: BDU:2015-08020
Id:
BDU:2015-08020
Reference:
https://bdu.fstec.ru/vul/2015-08020
FSTEC: BDU:2015-08019
FSTEC: BDU:2015-08019
Id:
BDU:2015-08019
Reference:
https://bdu.fstec.ru/vul/2015-08019
FSTEC: BDU:2015-07799
FSTEC: BDU:2015-07799
Id:
BDU:2015-07799
Reference:
https://bdu.fstec.ru/vul/2015-07799
FSTEC: BDU:2015-03459
FSTEC: BDU:2015-03459
Id:
BDU:2015-03459
Reference:
https://bdu.fstec.ru/vul/2015-03459
CVE: CVE-2002-0838
CVE: CVE-2002-0838
Id:
CVE-2002-0838
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0838
Comment
: Buffer overflow in (1) gv 3.5.8 and earlier, (2) gvv 1.0.2 and earlier, (3) ggv 1.99.90 and earlier, (4) gnome-gv, and (5) kghostview in kdegraphics 2.2.2 and earlier, allows attackers to execute arbitrary code via a malformed (a) PDF or (b) PostScript file, which is processed by an unsafe call to sscanf.
CWE:
CWE-Other ()
References:
CSSA-2002-053.0 (CALDERA)
CLA-2002:542 (CONECTIVA)
20020926 iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv (BUGTRAQ)
20020926 Errata: iDEFENSE Security Advisory 09.26.2002: Exploitable Buffer Overflow in gv (BUGTRAQ)
20021017 GLSA: ggv (BUGTRAQ)
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/47780&zone_32=category:security (CONFIRM)
DSA-176 (DEBIAN)
DSA-179 (DEBIAN)
DSA-182 (DEBIAN)
gv-sscanf-function-bo(10201) (XF)
VU#600777 (CERT-VN)
http://www.kde.org/info/security/advisory-20021008-1.txt (CONFIRM)
MDKSA-2002:069 (MANDRAKE)
MDKSA-2002:071 (MANDRAKE)
RHSA-2002:207 (REDHAT)
RHSA-2002:212 (REDHAT)
RHSA-2002:220 (REDHAT)
5808 (BID)
VENDOR: DSA-176-1
VENDOR: DSA-176-1
Id:
DSA-176-1
Reference:
https://www.debian.org/security/dsa-176
VENDOR: DSA-179-1
VENDOR: DSA-179-1
Id:
DSA-179-1
Reference:
https://www.debian.org/security/dsa-179
VENDOR: DSA-182-1
VENDOR: DSA-182-1
Id:
DSA-182-1
Reference:
https://www.debian.org/security/dsa-182
Content available only for registered users!
ovaldb@altx-soft.com