[Forgot Password]
Login  Register Subscribe

23631

 
 

115036

 
 

95906

 
 

909

 
 

77949

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-3916

Date: (C)2008-09-04   (M)2017-10-04
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.

Reference:
SECTRACK-1020734
http://www.securityfocus.com/archive/1/archive/1/501298/100/0/threaded
BID-30815
SECUNIA-32349
SECUNIA-32460
SECUNIA-33005
SECUNIA-38794
SECUNIA-43068
ADV-2008-2642
ADV-2008-3347
ADV-2010-0528
ADV-2011-0212
FEDORA-2008-9236
FEDORA-2008-9263
GLSA-200809-15
MDVSA-2008:200
RHSA-2008:0946
SUSE-SR:2011:002
http://lists.gnu.org/archive/html/bug-ed/2008-08/msg00000.html
http://lists.vmware.com/pipermail/security-announce/2010/000082.html
gnued-stripescapes-bo(44643)
http://support.avaya.com/elmodocs2/security/ASA-2008-461.htm
http://www.vmware.com/security/advisories/VMSA-2009-0003.html

CPE    1
cpe:/a:gnu:ed:0.2
CWE    1
CWE-119
OVAL    1
oval:org.secpod.oval:def:301596

© 2013 SecPod Technologies