Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2008-3916

Опубликовано: 04 сент. 2008
Источник: nvd
CVSS2: 9.3
EPSS Низкий

Описание

Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.

Комментарий

http://xforce.iss.net/xforce/xfdb/44643

"GNU ed is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the strip_escapes() function. By persuading a victim to open a specially-crafted file, a remote attacker could overflow a buffer and execute arbitrary code on the system."

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:gnu:ed:0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:ed:0.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:ed:0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:ed:0.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:ed:0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:ed:0.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:ed:0.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:ed:0.9:*:*:*:*:*:*:*

EPSS

Процентиль: 84%
0.02338
Низкий

9.3 Critical

CVSS2

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 17 лет назад

Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.

redhat
почти 17 лет назад

Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.

debian
почти 17 лет назад

Heap-based buffer overflow in the strip_escapes function in signal.c i ...

github
около 3 лет назад

Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.

oracle-oval
больше 16 лет назад

ELSA-2008-0946: ed security update (MODERATE)

EPSS

Процентиль: 84%
0.02338
Низкий

9.3 Critical

CVSS2

Дефекты

CWE-119